The vulnerability stems from improper handling of SVG namespace elements during sanitization. DOMPurify's core sanitize() function (in src/purify.js) is responsible for namespace-aware parsing and serialization. When converting SVG elements to HTML context, certain SVG constructs could be reinterpreted as executable HTML elements during DOM mutation. The high confidence comes from: 1) The vulnerability is fixed in the same version (2.2.2) that patched SVG-related mXSS 2) The CWE-79 classification indicates HTML sanitization flaws 3) The advisory specifically mentions SVG namespace conversion as the attack vector. While exact pre-patch code isn't available, the sanitize() function's core namespace handling logic would logically be the vulnerable component given the described attack scenario.