Input passed via the "content_heading" parameter to 107_plugins/content/content_manager.php while creating new content is not properly sanitised before being displayed to the user. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed.
Successful exploitation requires authentication and that the Content Management plugin is enabled.