Using unvalidated XML can expose an application to several types of XML-related attacks:
* XML injection - the structure and/or contents of the document are changed by the addition of extra elements
* XML entity expansion - the size of the document is ballooned by injecting elements that expand exponentially, exhausing server resources
* XML external entity injection - entities are injected which result dynamically including data from another source, such as a sensitive file on the filesystem.
This rule checks that method parameters are not unconditionally used directly in XML.