Skip to content
LogoTechnipages
LogoTechnipages
  • Topics
        • Android
        • Browsers
        • Gaming
        • Hardware
        • Internet
        • iPhone
        • Linux
        • macOS
        • Office
        • Reviews
        • Software
        • Windows
        • Definitions
        • All Recent Posts
  • Product Reviews
  • About

What Is Cross-Site Scripting?

Mel HawthorneNovember 9, 2020 Comments (0)

One of the most common classes of vulnerability in websites is called “Cross-Site Scripting” or “XSS”. XSS vulnerabilities are where it is possible for a user to cause JavaScript to be executed. There are a number of different variants of XSS vulnerability, with varying degrees of severity.

The problem with an attacker being able to execute JavaScript in the sessions of other users is that it is then possible for the attacker to do anything to the website that the victims see. This includes redirecting victims to external websites, stealing authentication tokens, and monitoring payment details.

The most severe form of XSS vulnerability is “Stored” or “Persistent” Cross-Site Scripting, this is where it is possible for an attacker to craft an XSS payload and then submit it, so it is saved in the database. With an XSS exploit saved in the database it’s then possible for it to affect other users over a broad time period.

Another form of Cross-Site Scripting is “Reflected”, this type isn’t saved at any point, instead, the payload is included in the browser. Typically, this type of XSS is part of phishing attacks, where an attacker attempts to trick a victim to click a malicious link.

Generally, most XSS attacks have the payload sent to the server at some point, but some attacks are purely client-side, never being sent to the server and instead only affecting client-side JavaScript. This is called DOM-based XSS as it stays in the JavaScript Document Object Model, or DOM. This type of vulnerability is particularly hard to identify and resolve because the exploits are never seen by the server and so can’t be logged.

Historically the prevention technique against XSS vulnerabilities is to filter all user-submitted data, using block-lists to reject any messages with meaningful characters or words in JavaScript. This tended to lead to an arms race of finding bypasses for the filter while also preventing some legitimate user-submissions. The correct solution is to use HTML entities to encode user-submitted data. with HTML entities modules enabled, characters are automatically encoded into a format where the browser knows to display them as the correct symbols but not to treat them as code.

Categories: Internet

Author Mel Hawthorne

You Might Also Like

  • Slack: How To Change the Workspace Icon

    Mel HawthorneInternet
  • Dropbox: How To Transfer a Large File To Friends

    Mel HawthorneInternet
  • Dropbox: How To Review Your Security Settings

    Mel HawthorneInternet
  • How to Enable and Disable Vertical Tabs in Microsoft Edge

    Judy SanhzInternet

Leave a Reply

Your email address will not be published. Required fields are marked *

  • service outage message on Xbox

    What to Do With a Service Outage Message on Xbox

  • signs your hdd is failing

    Signs That Your HDD Is Failing

  • how to fix error code 0x800705b4 in windows 11

    How to Fix Error Code 0x800705b4 in Windows 11

  • does chromebook need an antivirus

    Does Chromebook Need an Antivirus?

  • top vpns

    Top 5 VPNs to Keep Your Information Private in 2026

profile pic

The Experts Behind Technipages

My name is Mitch Bartlett. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. I started this site as a technical guide for myself and it has grown into what I hope is a useful reference for all.

Learn More

technipages logo white
linkedin icon

Technipages is part of Guiding Tech Media, a leading digital media publisher focused on helping people figure out technology. Learn more about our mission and team here.

© 2026 Guiding Tech Media All Rights Reserved

  • About Us
  • Contact
  • Terms of Use
  • Privacy Policy

© 2026 Guiding Tech Media All Rights Reserved

Information from your device can be used to personalize your ad experience.
Do not sell my personal information.

Last Updated on November 9, 2020 by Mitch Bartlett