Same issue as T386175: CVE-2025-32072: HTML injection in feed output from i18n message and T392276: CVE-2025-6591: HTML injection in API action=feedcontributions output from i18n message, just in FeaturedFeeds.
A number of messages are output into the RSS/Atom feed using ->text() instead of ->escaped(): https://gerrit.wikimedia.org/r/plugins/gitiles/mediawiki/extensions/FeaturedFeeds/+/5d852c526781e70723c35e81bbbad85d2ae92329/includes/FeaturedFeedChannel.php#150
I was unable to get any XSS on Special:FeedItem, both the title and body content are go through the parser and appear to be properly escaped. Again, I didn't research whether this would be exploitable in any feed reader (presumably feed readers should be defensive against this), but just copying T386175.
