The security advisory describes a reflected Cross-Site Scripting (XSS) vulnerability in the /api/icon/getDynamicIcon endpoint of SiYuan. The vulnerability exists because the content query parameter is not properly sanitized before being embedded in an SVG response. The provided commit 5c0cc375b47567e15edd2119066b09bb0aa18777 directly addresses this issue. The commit modifies the kernel/api/icon.go file, specifically within the getDynamicIcon function. The patch introduces a sanitization step by calling util.RemoveScriptsInSVG(svg) before the SVG is sent in the HTTP response. This confirms that getDynamicIcon is the function where the vulnerability existed. An attacker could exploit this by crafting a URL with a malicious payload in the content parameter, which, when visited by a victim, would execute arbitrary JavaScript in their browser.