The vulnerability exists in the renderPackageREADME function located in kernel/bazaar/readme.go. This function is responsible for converting package README files from Markdown to HTML. The vulnerability stems from the failure to sanitize the input Markdown before conversion. The lute engine, which is used for the conversion, has a sanitization feature that was not enabled. This allows an attacker to craft a malicious README file containing HTML with embedded JavaScript. When a user views the package in SiYuan's Bazaar, the backend renders this malicious README without sanitization. The resulting HTML is then injected into the DOM on the frontend via innerHTML. This triggers the execution of the embedded JavaScript. Because of SiYuan's insecure Electron configuration, which has nodeIntegration set to true and contextIsolation to false, the executed JavaScript has access to Node.js APIs, allowing the attacker to achieve Remote Code Execution on the user's machine. The provided patch addresses the root cause of the vulnerability by enabling the sanitization feature in the lute engine within the renderPackageREADME function.