After the CVE-2023-45818 fix, it removes comment nodes containing U+FEFF by this code. But in other nodes, it still did a simple string replacement, so above bypass worked due to the noscript's serialization behavior explained in HTML spec.
When can it be exploited?
When an app stores HTML set from user-input and displays it on the editor (especially on the editor shared with multiple users)