Document Object Model Based Cross Site Scripting is an XSS attack. In this vulnerability, the attack payload is executed as a result of modifying the Document Object Model environment in the victim’s browser. The old versions of WordPress allows remote attackers to inject malicious JavaScript code. This code exploits the Document Object Model based cross site scripting vulnerability. Here, the attacker sends an E-mail to the website users with a link. This link is used to exploit the vulnerability. It triggers a script that steals the user’s cookie. The other method is to post a link as comments in social media platforms.
The following is the example code
Select your language:
The above code can be invoked by:-
http://www.some.site/page.html?default=French
A Document Object Model Cross Site Scripting attack can be accomplished by sending the below link to a possible victim.
The impact include:-
This vulnerability can be fixed by:-