OWASP ZAP WAVE - XSS in a Form parameter with the script tab stripped out

Description

The 'name' parameter in the form is written to the page with script and SCRIPT tabs being stripped. It will still be vulnerable to script injection attacks.
Only a POST is vulnerable, not a GET.

Example

Name: