The vulnerability lies in the h3 library's handling of Server-Sent Events (SSE). The core issue is the lack of newline sanitization in the formatEventStreamMessage and formatEventStreamComment functions located in src/utils/internal/event-stream.ts. The SSE protocol uses newline characters (\n) to delimit fields and a double newline (\n\n) to separate events. The vulnerable versions of these functions directly concatenated user-controllable data (such as event id, name, data, or a comment) into the event stream. An attacker could include newline characters in this data to break out of the intended field and inject new, malicious SSE fields or even entirely separate events. This could lead to spoofed events, fake messages in a chat application, or a denial-of-service attack by forcing clients into a rapid reconnection loop. The patch addresses this by introducing sanitization. For single-line fields like id and event, it strips newline characters. For the multi-line data field and comment, it correctly formats each line according to the SSE specification, preventing injection.