The vulnerability is a stored Cross-Site Scripting (XSS) issue in PlantUML's handling of Graphviz diagrams. The root cause is insufficient sanitization of attributes within the diagram's data before it is rendered into an SVG file. The patch addresses the vulnerability by completely removing the sanitization logic and disabling SVG export for the PSystemDot class, which handles these diagrams. The analysis of the patch identified the key functions involved in the vulnerable process. The exportDiagramNow function was the entry point that took the user-provided diagram data. It called the filter function, which in turn used sanitizeDotAttribute and sanitizeAttributeValue to try to clean the data. However, this cleaning process was flawed, allowing an attacker to craft a diagram with malicious JavaScript in attributes like URL, href, or tooltip. When the application rendered the SVG, this script would be executed in the user's browser. The removal of this entire sanitization chain and the disabling of the feature are strong indicators that these functions were central to the vulnerability.