So you have to use an XML payload in order to attack (part of) your app?
Are any XML requests made when you explore your app in ZAP?
Is so then you should be good - ZAP should recognise the XML and attack your app via the XML tags and attributes.
You can test this in the ZAP GUI by selecting one of the requests with XML data and performing an active scan on just that request.
Have a look through the requests ZAP makes and you will hopefully see those attacks.
If not then your best option is to make some suitable test XML requests as part of your exploring.
Exploring your app effectively is key.
Theres not really much point in ZAP blindly sending XML/JSON payloads to every endpoint if finds.
However if it sees structured data being sent then it will be able to attack your app via payloads in structured data.
Does that make sense?
Cheers,
Simon