The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software.
The affected product’s web application does not properly neutralize the input during webpage generation, which could allow an attacker to inject code in the input forms.