Not sure if it’s cached at all, but from what I gather it’s a way the attacker can inject a script tag to execute some js, possibly inline, or definitely uploaded by a local user.
See https://lain.com/objects/9074544e-9edf-44d4-abff-94a80b95142a
If you’re using database config I have no idea, if you’re using plain text configuration:
config :pleroma, :rich_media, enabled: false076萌SNS is a social network, courtesy of 076. It runs on GNU social, version 2.0.2-beta0, available under the GNU Affero General Public License.
All 076萌SNS content and data are available under the Creative Commons Attribution 3.0 license.