Description
The web application uses SAML. The web application's SAML Consumer Service is vulnerable to XSS due to lack of sanitization of values from SAMLResponse.
An unauthenticated attacker may be able to use it to attack other users.
Remediation
Apply context-dependent sanitization to SAMLResponse values rendered on a page
References
Related Vulnerabilities
WordPress Plugin Markup (JSON-LD) structured in schema.org Cross-Site Scripting (4.8.1)
WordPress Plugin External Media without Import Cross-Site Scripting (1.0.1)
WordPress Plugin JobSearch WP Job Board Cross-Site Scripting (1.5.2)
WordPress Plugin Simple Slider 'New Image' Field Cross-Site Scripting (1.0)