SiteShadow
Back to vulnerability library

CWE-79 Cross-Site Scripting

What this means

SiteShadow found a pattern where untrusted input may be rendered as HTML or script.

Why it matters

Safer examples

1) Escape by default, only allow HTML when necessary

Use templating systems that escape output by default, and avoid "raw" rendering modes.

2) Sanitize when rendering user-provided HTML

el.innerHTML = DOMPurify.sanitize(userHtml);

3) Add defense-in-depth with CSP

Use Content Security Policy to reduce impact if an XSS slips through.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage