We cannot comment on one line descriptions, even if they are used by OWASP [2]. We need specific
steps to reproduce and I'm afraid "buy a license of X and run a scan" is not something we can work with.
For example, CVE IDs are specific and in most cases actionable. "Client side XSS" is a broad range of possible attacks,
many of which require a pretty specific set of circumstances. We have addressed at least three XSS vulnerabilities in the last
couple of years IIRC [1].
FWIW RabbitMQ management UI requires user authentication and elevated privileges before it can be accessed.
In 3.8 you don't have to enable it to get monitoring and metrics [3][4] which side steps any UI code-related
issues found by the scanner, whether they are legitimate or not.