Arbitrary HTML can be specified for an audit status message. For example, one could set their status message as:
This is a message with some <b>bold</b> text which executes some javascript: <script type="text/javascript">alert("hi");</script>
Which results in the javascript in the script tag being executed for anyone viewing the status message.
Sadly there are almost certainly many other instances of such vulnerability in the codebase.