Cross Site Scripting (Persistent) - Prime
ID |
cross_site_scripting_persistent_prime |
Severity |
info |
Kind |
Cross-Site Scripting |
CWE |
79 |
Description
Cross Site Scripting (Persistent) - Prime vulnerability detected. This detector identifies potential injection points during the priming phase of persistent XSS testing, where malicious payloads are submitted to the application and stored for later retrieval and verification.
Rationale
Persistent XSS prime attacks inject stored payloads that will be executed when other users view the affected content. An attacker submits malicious scripts through input fields, file uploads, or API calls that are stored in databases or files. When victims access pages displaying this stored content, the malicious code executes in their browsers. This allows session hijacking, credential theft, and privilege escalation without requiring the victim to click malicious links, making it more dangerous than reflected XSS.
Remediation
Validate and sanitize all user input before storage using allow lists for acceptable characters and formats. Apply context-aware output encoding when rendering stored data in HTML, JavaScript, or other contexts. Use Content Security Policy headers to restrict script execution. Implement HTTP-only flags on session cookies to prevent JavaScript access. Consider using automated input sanitization libraries and frameworks that provide built-in XSS protection.