The vulnerability described in CVE-2025-70791 is a Cross-site Scripting (XSS) issue in the '/admin/order/abandoned' endpoint of Microweber. The provided commit aa0791fc286d785ccd33ccc706f7bb3ed05b1d7f directly addresses this vulnerability. The analysis of the patch shows that the abandoned function within the src/MicroweberPackages/Order/Http/Controllers/Admin/AbandonedOrderController.php file was modified to add input sanitization using the xss_clean function. Specifically, the $orderDirection variable, which is derived from the orderDirection request parameter, is now sanitized before being used. This confirms that the abandoned function was the location of the vulnerability. An attacker could have previously injected malicious JavaScript into the orderDirection parameter, leading to execution in a privileged user's browser. The commit also includes similar XSS fixes for other parts of the application, but the primary vulnerability described is located in the abandoned function.