The vulnerability exists in the lxml-html-clean library, specifically within the Cleaner._has_sneaky_javascript method in lxml_html_clean/clean.py. The root cause of the vulnerability is the incorrect sanitization of CSS content. The function used style.replace('\\', '') to strip backslashes from the input style string. This was intended as a security measure, but it created a bypass for CSS filters. Attackers could use CSS Unicode escape sequences, such as \69 for the character 'i', to construct malicious payloads like @\69mport. After the vulnerable line of code processed this payload, it would become @69mport, which would not be caught by the blacklist looking for @import. However, a browser's CSS parser would correctly decode the original escape sequence and execute the @import directive. The patch fixes this by replacing the naive backslash removal with a new method, _decode_css_unicode_escapes, which correctly interprets and decodes these escape sequences before the security checks are performed. This ensures that the sanitized content is evaluated in the same way a browser would, thus preventing the bypass.