OWASP ZAP WAVE - Simple XSS in a URL parameter

Description

The 'name' parameter in the URL is written to the page without being sanitised and so is vulnerable to a simple script injection attack.
Only a GET is vulnerable, not a POST.

Example

The URL 'name' parameter is test

Example link: Simple XSS in a URL parameter