The vulnerability is a reflected Cross-Site Scripting (XSS) issue in the copyparty application, triggered via the setck URL parameter. The root cause is the lack of input validation in the setck function within copyparty/httpcli.py. An attacker could craft a malicious URL with a crafted setck parameter containing javascript code. When a user clicks this link, the setck function would process the malicious parameter and reflect it into a Set-Cookie header. The browser would then execute the javascript in the context of the user's session. The patch addresses this by introducing strict validation on the setck parameter's content and length within the setck function. Additionally, the unescape_cookie function in copyparty/util.py was hardened to limit the length of cookie values as a defense-in-depth measure, and the run function in copyparty/httpcli.py was updated to support this change.