The vulnerability exists in the SanitizeSVG function located in the kernel/util/misc.go file. The root cause is an incomplete sanitization process for SVG content, specifically within href attributes. The code checked for the javascript: prefix using strings.HasPrefix, but this check could be bypassed by injecting whitespace characters (like tabs, newlines, or carriage returns) into the javascript: string (e.g., java	script:). While the Go strings.HasPrefix check would fail, browsers would strip these characters before parsing the URL, thus executing the embedded JavaScript. The fix, identified in commit 257aa0ef4439a9209fcb930a946740350811da9a, involves adding a step to explicitly remove these whitespace characters from the attribute value before the security checks are performed. This ensures that such bypass techniques are no longer effective. The vulnerable function, util.SanitizeSVG, would be the primary indicator in a runtime profile during exploitation.