Figure 2. Dangerous Situation
Before an XML gateway is deployed, XML entering the organization across the perimeter firewall is not authenticated or content validated.