The vulnerability, a reflected XSS, is located in the list_html function of the salvo web framework, specifically within the salvo_serve_static crate. The vulnerability description explicitly points to this function and the unsanitized use of current.path. By analyzing the commits between the last vulnerable version (0.88.0) and the first patched version (0.88.1), I identified the fixing commit 6f1f42c447b0ee8efc752f763b8a46791b4b5113. The patch within this commit clearly shows the introduction of the encode_url_path function to sanitize the path before it's embedded in the HTML response inside the list_html function in crates/serve-static/src/dir.rs. The vulnerable code was directly using the request path in the HTML, which is a classic reflected XSS vulnerability. The fix involves escaping the user-provided path, which confirms the function's role in the vulnerability.