Description
The web application uses SAML. The web application's SAML Consumer Service is vulnerable to XSS due to lack of sanitization of values from SAMLResponse.
An unauthenticated attacker may be able to use it to attack other users.
Remediation
Apply context-dependent sanitization to SAMLResponse values rendered on a page
References
Related Vulnerabilities
WordPress Plugin Request Quote via Whatsapp for Woocommerce Cross-Site Scripting (1.0.1)
WordPress Plugin WP SVG images Cross-Site Scripting (3.3)
WordPress Plugin Simple Security Multiple Cross-Site Scripting Vulnerabilities (1.1.5)
WordPress Plugin Integration for Contact Form 7 and Mailchimp Cross-Site Scripting (1.0.9)
WordPress Plugin MailPoet-emails and newsletters in WordPress Cross-Site Scripting (3.23.1)