The vulnerability is a classic stored Cross-Site Scripting (XSS) issue within the Craft Commerce plugin. The root cause is the failure to properly sanitize user-controllable data before it is rendered in the admin panel. The advisory specifically calls out the 'Name' and 'Description' fields for Shipping Zones, and the patch confirms this. When an administrator with sufficient permissions creates an entity (like a shipping zone) and injects HTML/JavaScript into certain fields, that payload is stored in the database. The vulnerable functions identified are controller actions responsible for fetching this data and preparing it for display in various tables within the admin UI (e.g., /admin/commerce/store-management/primary/shippingzones). The original code directly used the raw data from the database. When another administrator views the page containing this data, the malicious script executes in their browser, leading to potential actions like session hijacking or privilege escalation, as demonstrated in the proof-of-concept. The provided patch addresses the issue by applying Html::encode() to the output, which neutralizes the malicious scripts. While the advisory focuses on Shipping Zones, the patch proactively fixes the same flaw across multiple controllers handling similar data types (Tax Zones, Shipping Categories, etc.), all of which are included in the analysis.