Description
The web application uses SAML. The web application's SAML Consumer Service is vulnerable to XSS due to lack of sanitization of values from SAMLResponse.
An unauthenticated attacker may be able to use it to attack other users.
Remediation
Apply context-dependent sanitization to SAMLResponse values rendered on a page
References
Related Vulnerabilities
WordPress Plugin YARPP-Yet Another Related Posts Cross-Site Scripting (5.30.2)
WordPress Plugin Tutor LMS-eLearning and online course solution Cross-Site Scripting (1.9.5)
WordPress Plugin Google +1 by BestWebSoft Cross-Site Scripting (1.1.6)
WordPress Plugin Spam protection, AntiSpam, FireWall by CleanTalk Cross-Site Scripting (5.154)
WordPress Plugin GS Filterable Portfolio Cross-Site Scripting (1.6.0)