A CGI application hosted on the remote web server is potentially prone to an XML injection attack.
Description
By sending specially crafted parameters to one or more CGI scripts hosted on the remote web server, Nessus was able to get a very different response, which suggests that it may have been able to modify the behavior of the application and directly access a SOAP back-end. An attacker may be able to exploit this issue to bypass authentication, read confidential data, modify the remote database, or even take control of the remote operating system. Exploitation of XML injections is usually far from trivial.
Solution
Modify the affected CGI scripts so that they properly escape arguments, especially XML tags and special characters (angle brackets and slashes).