Description
The Action URL parameter for one HTML form from this page is dirrectly controlled by user input. The Action parameter specifies the website where the user-submitted information is being sent. An attacker can provide a website controlled by him for the form action parameter and send this malicious link to your users. Any user who will click that link and submit the vulnerable form will send his information to the attacker.
Remediation
Your script should properly sanitize user input.
References
Related Vulnerabilities
WordPress Plugin User Avatar TimThumb Arbitrary File Upload (1.3.7)
WordPress plugin All in One SEO Pack privilege escalation vulnerabilities
Resin Application Server Improper Input Validation Vulnerability (CVE-2012-2965)
Squid Improper Input Validation Vulnerability (CVE-2016-2570)
Python Improper Input Validation Vulnerability (CVE-2018-20852)