The vulnerability exists due to insufficient sanitization of user-supplied data within the "/h/rest" endpoint. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.