The vulnerability is a series of stored Cross-Site Scripting (XSS) issues within the Craft Commerce plugin's admin panel. The root cause is the failure to properly sanitize user-provided input before it is displayed on various administrative pages. The provided patch fa273330807807d05b564d37c88654cd772839ee reveals that multiple controller actions responsible for rendering tables of data (e.g., inventory locations, shipping categories, tax rates) were directly outputting values like names, descriptions, and addresses without HTML encoding. An attacker with permissions to edit these entities could insert malicious JavaScript into these fields. When a privileged user, such as an administrator, views the list pages for these items, the malicious script would execute in their browser's context. This could be used to steal session cookies, perform actions on behalf of the administrator, or as shown in the proof-of-concept, escalate the attacker's own privileges to that of an administrator. The fix applied across all affected files is to wrap the potentially unsafe data points with Html::encode(), which neutralizes the script content by converting HTML special characters into their entity equivalents, thus preventing the browser from executing them.