Invicti detected data:
use in a CSP directive.
An attacker can bypass CSP and exploit a Cross-site Scripting vulnerability successfully by using data:
protocol.
Remove data:
sources from your CSP directives.
You can search and find all vulnerabilities