But after reading it, I still don't understand how resistant XXH3 (one of xxHash family) is to preimage attacks.
Not at all - it's easy to create an image that hashes to an arbitrary value.
Yes, XXH3 output is 64/128 bits which means that the probability to find image is $2^{64}/2^{128}$ corresponding.
The probabilities hold if the strategy you use is "pick a image, hash it, and see what's the result". There are far more efficient strategies.
Maybe there is some kind of not brute-force attack?
Sure is.
xxhash consists of steps that:
Transform the current state in an invertable way; or
Add in a word that depends (again, in an invertable way) on the next word of the image (and no other operation within xxhash depends on that input word).
Hence, to generate a image that hashes to a specific value, all you need to do is select a template that consists of values except for one word; then, you evaluate the xxhash forward until you get to that one word, coming up with an internal state value A. Then, you take the target hash value, and you compute the xxhash backwards until you get to that one word, coming up with an internal state value B. Then, all you need to do is select the one unknown word to be something that converts the state value A into the state value B - that's easy; insert that word into the template and you're done.
And, to address your last question:
For cryptographical hashes it is hard to find them but they are exist. When we have successfully run the preimage attack, how can we be sure that the value we find is the original value?
Obviously, collisions are inevitable for any function that converts a potentially long string into a fixed length shorter one. Now, if we find an image that hashes to the same value, how do we ensure that it's the same image that was originally hashed? Answer: in general, we can't, unless we know a lot about the original image (e.g. in the above attack on xxhash, we knew all the words of the input except for one). On the other hand, for most attacks against cryptographical hashes, we don't care - the attacker usually wins if he can find any preimage.