The vulnerability is a Stored Cross-Site Scripting (XSS) weakness in the file upload functionality of TypiCMS. The root cause is twofold. First, the rules() method within the FileFormRequest class explicitly allows files with the svg MIME type to be uploaded. This is the initial entry point for the attack. Second, the handle() method in the FileUploader service, which processes and saves the uploaded file, failed to sanitize the content of these SVG files before the patch. The provided commit d480a0be1e8e7c0600bb9a325bb11920ee66497d rectifies this by introducing a new sanitizeSvg method that is called from within the handle method if the uploaded file is an SVG. This confirms that FileUploader::handle was the function that vulnerably processed the unsanitized input. Therefore, both FileFormRequest::rules() and FileUploader::handle() would appear in a runtime profile during the exploitation of this vulnerability, as one permits the malicious file and the other processes and stores it.