5.14 XML InjectionΒΆ

Verify that the application is not susceptible to common XML attacks, such as XPath query tampering, XML External Entity attacks, and XML injection attacks.

Levels: 1, 2, 3