The vulnerability is a stored Cross-Site Scripting (XSS) issue in the Emissary web interface's navigation bar. The root cause is the lack of server-side validation for the link values of navigation items, which are configurable by an administrator. The emissary.server.mvc.NavAction.EmissaryNav.convert function was identified as the vulnerable function. This function is responsible for processing the configured navigation items. Before the fix, it would directly take the link value from the configuration and prepare it for rendering in the nav.mustache template. An attacker with administrative privileges could set a navigation item's link to a javascript: URI. When any authenticated user clicks this link, the JavaScript payload executes in their browser context, allowing for session hijacking or other malicious actions. The patch addresses this by introducing a new method, isValidLink, which uses a regular expression to allowlist only http://, https://, and relative URLs. The convert method was modified to use this validation, filtering out any invalid links before they are rendered.