Hi Olu,
this applies to build 6.49.
I've added a mechanism to "set" Session variables as "unsafe". This is done by using the "picture". So you can do something like this;
p_web.SSV('whatever','<script> alert("me"); </script>','@U1')
the @U1 is a "picture" - essentially "unsafe 1"
when used as a tag, like you are doing, it will accept that the contents may contain unsafe HTML. Of course you are then responsible to make sure the code does not contain anything nefarious - specifically you should absolutely not set this for any session value that is an "input" on a page.
Cheers
Bruce