Description
The web application uses SAML. The web application's SAML Consumer Service is vulnerable to XSS due to lack of sanitization of values from SAMLResponse.
An unauthenticated attacker may be able to use it to attack other users.
Remediation
Apply context-dependent sanitization to SAMLResponse values rendered on a page
References
Related Vulnerabilities
WordPress Plugin Qwizcards-online quizzes and flashcards Cross-Site Scripting (3.36)
WordPress Plugin SendGrid Cross-Site Scripting (1.10.7)
WordPress Plugin BuddyBoss Wall Cross-Site Scripting (1.1.7)
WordPress Plugin World Travel Information Cross-Site Scripting (1.0.0)
WordPress Plugin Donation Block For PayPal Cross-Site Scripting (2.0.0)