Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-80 (Web页面中脚本相关HTML标签转义处理不恰当(基本跨站脚本)) — Vulnerability Class 403

403 vulnerabilities classified as CWE-80 (Web页面中脚本相关HTML标签转义处理不恰当(基本跨站脚本)). AI Chinese analysis included.

CWE-80 represents a critical input validation weakness where applications fail to properly sanitize user-supplied data before rendering it in web pages. This flaw allows attackers to inject malicious scripts, typically JavaScript, into the HTML content viewed by other users. Exploitation usually occurs when an attacker crafts a malicious URL or form input containing script tags, which the vulnerable application then executes in the victim’s browser without proper filtering. This can lead to severe consequences such as session hijacking, credential theft, or defacement. To mitigate this risk, developers must implement robust output encoding strategies, ensuring that all special characters like angle brackets and ampersands are converted into their safe HTML entity equivalents. Additionally, employing Content Security Policy headers and utilizing modern frameworks with built-in escaping mechanisms further reduces the attack surface by preventing the execution of unauthorized scripts.

MITRE CWE Description
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
Common Consequences (1)
Confidentiality, Integrity, AvailabilityRead Application Data, Execute Unauthorized Code or Commands
An attacker could insert special characters that are processed client-side in the context of the user's session.
Mitigations (4)
ImplementationCarefully check each input parameter against a rigorous positive specification (allowlist) defining the specific characters and format allowed. All input should be neutralized, not just parameters that the user is supposed to specify, but all data in the request, including hidden fields, cookies, headers, the URL itself, and so forth. A common mistake that leads to continuing XSS vulnerabilities i…
ImplementationUse and specify an output encoding that can be handled by the downstream component that is reading the output. Common encodings include ISO-8859-1, UTF-7, and UTF-8. When an encoding is not specified, a downstream component may choose a different encoding, either by assuming a default encoding or automatically inferring which encoding is being used, which can be erroneous. When the encodings are i…
ImplementationWith Struts, write all data from form beans with the bean's filter attribute set to true.
ImplementationTo help mitigate XSS attacks against the user's session cookie, set the session cookie to be HttpOnly. In browsers that support the HttpOnly feature (such as more recent versions of Internet Explorer and Firefox), this attribute can prevent the user's session cookie from being accessible to malicious client-side scripts that use document.cookie. This is not a complete solution, since HttpOnly is n…
Effectiveness: Defense in Depth
Examples (1)
In the following example, a guestbook comment isn't properly encoded, filtered, or otherwise neutralized for script-related tags before being displayed in a client browser.
<% for (Iterator i = guestbook.iterator(); i.hasNext(); ) { Entry e = (Entry) i.next(); %> <p>Entry #<%= e.getId() %></p> <p><%= e.getText() %></p> <% } %>
Bad · JSP
CVE IDTitleCVSSSeverityPublished
CVE-2024-6183 EZ-Suite EZ-Partner Forgot Password cross site scripting — EZ-Partner 4.3 Medium2024-06-20
CVE-2024-6108 Genexis Tilgin Home Gateway Login cross site scripting — Tilgin Home Gateway 4.3 Medium2024-06-18
CVE-2024-5741 XSS in inventory view — Checkmk 6.5 Medium2024-06-17
CVE-2024-36395 Verint - CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) — WFO 6.1 Medium2024-06-13
CVE-2024-5851 playSMS SMS Schedule cross site scripting — playSMS 3.5 Low2024-06-11
CVE-2024-35680 WordPress YITH WooCommerce Product Add-Ons plugin <= 4.9.2 - Content Injection vulnerability — YITH WooCommerce Product Add-Ons 5.3 Medium2024-06-10
CVE-2024-37156 TokenController formName not sanitized in hidden input — SuluFormBundle 6.1 Medium2024-06-06
CVE-2024-32464 ActionText ContentAttachment can Contain Unsanitized HTML — rails 6.1 Medium2024-06-04
CVE-2023-49852 WordPress Responsive Slick Slider WordPress plugin <= 1.4 - Content Injection vulnerability — Responsive Slick Slider WordPress 6.5 Medium2024-06-04
CVE-2023-48285 WordPress Accept Stripe Payments plugin <= 2.0.79 - Content Injection vulnerability — Stripe Payments 5.3 Medium2024-06-04
CVE-2023-47513 WordPress ARI Stream Quiz – WordPress Quizzes Builder plugin <= 1.3.2 - Content Injection vulnerability — ARI Stream Quiz 5.4 Medium2024-06-04
CVE-2023-46310 WordPress wpDiscuz plugin <= 7.6.10 - Content Injection vulnerability — wpDiscuz 5.3 Medium2024-06-04
CVE-2023-45635 WordPress Responsive Tabs plugin < 4.0.6 - HTML Content Injection vulnerability — Responsive Tabs 5.4 Medium2024-06-04
CVE-2023-45053 WordPress WP Content Pilot plugin <= 1.3.3 - HTML Injection vulnerability — WP Content Pilot – Autoblogging & Affiliate Marketing Plugin 4.3 Medium2024-06-04
CVE-2023-40557 WordPress Tabs & Accordion plugin <= 1.3.10 - Content Injection vulnerability — Tabs & Accordion 5.4 Medium2024-06-04
CVE-2023-39161 WordPress Discussion Board plugin <= 2.4.8 - Content Injection vulnerability — Discussion Board 5.4 Medium2024-06-04
CVE-2023-23735 WordPress Spectra – WordPress Gutenberg Blocks plugin <= 2.3.0 - Unauthenticated Email HTML Injection Vulnerability — Spectra 5.3 Medium2024-06-03
CVE-2024-35224 Stored Cross-Site Scripting (XSS) in OpenProject — openproject 7.6 High2024-05-23
CVE-2024-23522 WordPress Formidable Forms plugin <= 6.7 - Content Injection vulnerability — Formidable Forms 5.3 Medium2024-05-17
CVE-2024-4214 WordPress cardealer plugin <= 4.15 - Content Injection vulnerability — Car Dealer 2.7 Low2024-05-17
CVE-2024-24874 WordPress Polls CP plugin <= 1.0.71 - Content Injection vulnerability — CP Polls 5.3 Medium2024-05-17
CVE-2024-32790 WordPress Pricing Table by Supsystic plugin <= 1.9.12 - Content Injection vulnerability — Pricing Table by Supsystic 4.3 Medium2024-05-17
CVE-2024-34699 GZ::CTF allows unprivileged user can perform XSS attacks by constructing malicious team names. — GZCTF 6.5 Medium2024-05-13
CVE-2023-48763 WordPress JetFormBuilder plugin <= 3.1.4 - Content Injection vulnerability — JetFormBuilder 5.3 Medium2024-04-24
CVE-2024-32875 Hugo doesn't escape markdown title in internal render hooks — hugo 6.1 Medium2024-04-23
CVE-2024-2380 XSS in graph rendering — Checkmk 4.6 Medium2024-04-05
CVE-2024-25690 HTML injection in ArcGIS Web AppBuilder — ArcGIS Enterprise Web App Builder 4.7 Medium2024-04-04
CVE-2024-20362 Cisco Small Business 安全漏洞 — Cisco Small Business RV Series Router Firmware 6.1 Medium2024-04-03
CVE-2024-1606 HTML injection in BMC Control-M — Control-M 4.6 Medium2024-03-18
CVE-2024-24807 Sulu is vulnerable to HTML Injection via Autocomplete Suggestion — sulu 2.7 Low2024-02-05

Vulnerabilities classified as CWE-80 (Web页面中脚本相关HTML标签转义处理不恰当(基本跨站脚本)) represent 403 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.