User Controllable HTML Element Attribute (Potential XSS)
ID |
user_controllable_html_element_attribute_potential_xss |
Severity |
info |
Kind |
Cross-Site Scripting |
CWE |
20 |
Description
This check looks at user-supplied input in query string parameters and POST data to identify where certain HTML attribute values might be controlled. This provides hot-spot detection for XSS (cross-site scripting) that will require further review by a security analyst to determine exploitability.
Rationale
User-controlled HTML attributes can be exploited for cross-site scripting even when the input does not directly appear in script tags. Attackers can inject malicious payloads into attributes like href, src, or data attributes that execute JavaScript when triggered. For example, injecting javascript: URLs into href attributes or manipulating attributes that feed into client-side frameworks can lead to code execution in the victim’s browser, enabling session hijacking, credential theft, or malware distribution.