XSS in the WYSIWYG HTML editor by abusing the image tag.
For example, in the POST request when adding a comment, add this payload to the field with the comment text by using an interception proxy like BurpSuite:
<div><image src=validateNonExistantImage.png onloadstart=alert(1337)> hey girl hey </div>
Now the payload is stored on the page. When the next user visits, the XSS will execute.
This is a good example of why client side validation does not stop attackers who routinely bypass validation by interacting with APIs and server side endpoints directly.
https://github.com/quilljs/quill/issues/3273
I reported this to LinkedIn since they are using QuillJS, but they only have a private bug bounty program.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3163
NOTE: Though the CVE is marked as "disputed", it is a very basic stored XSS has been easily reproducible. They seemed to accept this explanation and remediation note in issue #3558, but as of September 2022, the issue is still open and there doesn't seem to be a security patch in place, so it's still exploitable. As explained here, in order to fix it, there needs to be server side sanitation in addition to the client side validation that they're already using:
https://github.com/quilljs/quill/issues/3558
More discussion here, where I comment as "burninatorsec2":
https://github.com/quilljs/quill/issues/3364