Description
The Action URL parameter for one HTML form from this page is dirrectly controlled by user input. The Action parameter specifies the website where the user-submitted information is being sent. An attacker can provide a website controlled by him for the form action parameter and send this malicious link to your users. Any user who will click that link and submit the vulnerable form will send his information to the attacker.
Remediation
Your script should properly sanitize user input.
References
Related Vulnerabilities
WordPress Plugin Essential Addons for Elementor Security Bypass (5.7.1)
WordPress Improper Input Validation Vulnerability (CVE-2008-4106)
OpenSSL Improper Input Validation Vulnerability (CVE-2017-3733)
phpBB Improper Input Validation Vulnerability (CVE-2019-9826)
Django Improper Input Validation Vulnerability (CVE-2014-0480)