{"id":1561,"date":"2022-10-13T15:00:16","date_gmt":"2022-10-13T15:00:16","guid":{"rendered":"https:\/\/cwatch.comodo.com\/blog\/?p=1561"},"modified":"2024-07-08T15:35:03","modified_gmt":"2024-07-08T15:35:03","slug":"what-is-xss","status":"publish","type":"post","link":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/","title":{"rendered":"What is XSS?"},"content":{"rendered":"<h2>What is Cross-Site Scripting (XSS)?<\/h2>\n<p><strong>Cross-site scripting (XSS)<\/strong> is a client-side code attack carried out by injecting malicious scripts into a legitimate website or web application. The injected malicious scripts are commonly referred to as a malicious payload. Currently, XSS Attack is the most widespread type of web application vulnerability. It occurs when a particular web application uses unencoded or unvalidated user input in the output it generates.<\/p>\n<p>XSS lets an attacker target a victim indirectly. In other words, the attacker exploits a vulnerability within a website or web application that the victim would visit, using it as a vehicle to deliver the malicious script to the victim\u00e2\u20ac\u2122s browser.<\/p>\n<p>XSS can take advantage of legacy and\/or obsolete VBScript, ActiveX, and Flash scripts and often JavaScript because it is the foundation of most browsing experiences.<\/p>\n<h2>XSS Attack<\/h2>\n<p>An XSS attack is one of the most dangerous attacks on web applications because it can have significant consequences.<\/p>\n<p>The attacker injects the payload into a vulnerable web page. When the victim visits the page\u00e2\u20ac\u201doften as a result of social engineering techniques used by the attacker\u00e2\u20ac\u201dthe malicious JavaScript code runs in the user\u00e2\u20ac\u2122s browser. Below is the server-side pseudo-code normally used to showcase the most recent comment on a web page.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/source-code.png\" alt=\"sourcecode\" \/><\/p>\n<p>As shown above, the script is a printout of the latest comment from a comments database. If the page is vulnerable, an attacker could submit a comment that contains a malicious XSS payloads:<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/script.png\" alt=\"script\" \/><\/p>\n<p><strong>The web page visitor will then get served the following HTML on the page.<\/strong><\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/source-code1.png\" alt=\"source code\" \/><\/p>\n<p>As soon as the page loads in the victim\u00e2\u20ac\u2122s browser, the malicious script will execute. In most cases, the victim is unaware of, and therefore unable to prevent, the attack.<\/p>\n<h2>XSS Attack Example<\/h2>\n<p>Below is a comprehensive list of <strong>XSS attack vectors<\/strong> used by attackers to compromise the <a href=\"https:\/\/cwatch.comodo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">security of a website<\/a> or web application.<\/p>\n<p><strong>script<\/strong> tag<\/p>\n<p>The <strong>script<\/strong> tag can use external JavaScript code or embed the code within the script tag and is considered the most straightforward XSS payloads.<\/p>\n<p><img decoding=\"async\" class=\"alignleft\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/source-code2.png\" alt=\"sourcecodes\" \/><\/p>\n<p><em><strong>body tag<\/strong><\/em><\/p>\n<p>The XSS payloads can be placed inside the body tag by using the onload attribute.<\/p>\n<p> <img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/source-code3.png\" alt=\"source codes\" \/><\/p>\n<p><em><strong>img tag<\/strong><\/em><\/p>\n<p>Some browsers will execute JavaScript that is found in the img tag.<\/p>\n<p><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/source-code4.png\" alt=\"source code\" \/><\/p>\n<p><em><strong>iframe tag<\/strong><\/em><\/p>\n<p>The iframe tag supports the embedding of another HTML page into the parent page. iFrames provide an effective way to pull off phishing attacks.<\/p>\n<p><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/source-code5.png\" alt=\"source code\" \/><\/p>\n<p><em><strong>link tag<\/strong><\/em><\/p>\n<p>The link tag can be infected with scripts because it is often used to link to external style sheets.<\/p>\n<p><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/source-code6.png\" alt=\"source code\" \/><\/p>\n<p><em><strong>table tag<\/strong><\/em><\/p>\n<p>The framework trait of the table and cell (td) tags can be used to connect to a script instead of an image.<\/p>\n<p><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/source-code7.png\" alt=\"source code\" \/><\/p>\n<p><em><strong>div tag<\/strong><\/em><\/p>\n<p>The div tag can also embed a script.<\/p>\n<p><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/source-code8.png\" alt=\"source code\" \/><\/p>\n<p><em><strong>object tag<\/strong><\/em><\/p>\n<p>An external site can use the object tag to include a script.<\/p>\n<p><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/source-code9.png\" alt=\"source code\" \/><\/p>\n<h2>XSS Types Vulnerabilities<\/h2>\n<p>There are <strong>three types of XSS vulnerabilities<\/strong>: Stored XSS, Reflected XSS, and DOM Based XSS.<\/p>\n<p><em><strong>Stored XSS <\/strong><\/em><\/p>\n<p>Stored XSS vulnerabilities occur when the malicious payload is saved. Stored <strong>cross-site scripting<\/strong> is pretty scary for a couple of reasons: The payload is invisible to browsers XSS filter, and when users visit the page they accidentally trigger the payload.<\/p>\n<p><em><strong>Reflected XSS<\/strong><\/em><\/p>\n<p>The Reflected XSS vulnerability is created when the user input from a URL or POST data is displayed on the page without being stored. This kind of payload is generally caught by built-in browser XSS filters in Chrome, Internet Explorer or Edge.<\/p>\n<p><em><strong>DOM Based XSS<\/strong><\/em><\/p>\n<p>The vulnerability occurs in the DOM (document object model) rather than the HTML.<\/p>\n<h2>XSS Prevention<\/h2>\n<p>The impact of XSS Attack vulnerabilities varies and can include CSRF attacks, session hijacking, tokens, and more. By employing an XSS vulnerability, an attacker can trick the user and take control of their account. When the victim has administrative rights, depending on the application and privileges of that account, an attack may even lead to code execution on the server.<\/p>\n<p>To steer clear of <strong>cross-site scripting vulnerabilities<\/strong>, it is essential to implement context-dependent output encoding. In a few cases, it is sufficient to encode the HTML special characters like the opening and closing tags. In other cases, URL encoding is necessary.<\/p>\n<p>Today, web browsers come with a built-in XSS filter, but they cannot track all kinds of cross-site scripting attacks. A browser&#8217;s XSS filter should be considered just one line of defense to minimize the impact of existing vulnerabilities.<\/p>\n<p>Web developers should avoid using blacklists as there are ways to bypass them. They should also avoid the removal of risky functions and characters because the browsers&#8217; XSS filters can&#8217;t recognize the dangerous payloads when the output is tampered with, allowing for possible bypass.<\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/how-to-check-if-a-website-is-safe.php\"><strong>Check Website Safety<\/strong><\/a><\/p>\n<p><a class=\"get_started_cta\" href=\"https:\/\/cwatch.comodo.com\/cwatch-plans.php?track=9676&amp;af=7639\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" style=\"float: left;\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/cwatch-website-security.jpg\" alt=\"website-security\" \/><\/a><\/p>\n<div class=\"clearfix\"><\/div>\n<p><a href=\"https:\/\/cwatch.comodo.com\/best-website-security-for-enterprise.php\"><strong>Best Website Security<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-checker.php\"><strong>Website Checker<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/wordpress-security.php\"><strong>WordPress Security<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-status-checker.php\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Website Status<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/?track=17918&amp;af=17918\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Website Backup<\/strong><\/a><\/p>\n<p><strong>Related Resource<\/strong><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/cdn-security.php\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Cheap CDN<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/best-cdn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Best CDN Providers<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/pay-as-you-go-cdn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Pay as You Go CDN<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/what-is-cdn.php\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>CDN<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/free-cdn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Free CDN<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/blog\/hosting\/free-web-hosting\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Free Website Hosting<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/top-10-vulnerability-assessment-scanning-tools\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Vulnerability Scanner<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Cross-Site Scripting (XSS)? Cross-site scripting (XSS) is a client-side code attack carried out by injecting malicious scripts into a legitimate website or web application. The injected malicious scripts are commonly referred to as a malicious payload. Currently, XSS Attack is the most widespread type of web application vulnerability. It occurs when a particular [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1562,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[1332,1342,141,1352],"class_list":["post-1561","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attack","tag-types-of-xss-vulnerabilities","tag-what-is-xss","tag-xss-attack","tag-xss-prevention"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is XSS? | XSS Attack | Types of XSS and Prevention Tips<\/title>\n<meta name=\"description\" content=\"What is XSS attack - Cross-site scripting (XSS) is a client-side code attack carried out by injecting malicious code. Try the cWatch web security to prevent attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is XSS? | XSS Attack | Types of XSS and Prevention Tips\" \/>\n<meta property=\"og:description\" content=\"What is XSS attack - Cross-site scripting (XSS) is a client-side code attack carried out by injecting malicious code. Try the cWatch web security to prevent attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/\" \/>\n<meta property=\"og:site_name\" content=\"cWatch Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-13T15:00:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-08T15:35:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/xss-prevention.png\" \/>\n\t<meta property=\"og:image:width\" content=\"906\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@seoindia\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d\"},\"headline\":\"What is XSS?\",\"datePublished\":\"2022-10-13T15:00:16+00:00\",\"dateModified\":\"2024-07-08T15:35:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/\"},\"wordCount\":809,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/xss-prevention.png\",\"keywords\":[\"Types of XSS vulnerabilities\",\"What is XSS\",\"XSS attack\",\"XSS Prevention\"],\"articleSection\":[\"Cyber Attack\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/\",\"name\":\"What is XSS? | XSS Attack | Types of XSS and Prevention Tips\",\"isPartOf\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/xss-prevention.png\",\"datePublished\":\"2022-10-13T15:00:16+00:00\",\"dateModified\":\"2024-07-08T15:35:03+00:00\",\"description\":\"What is XSS attack - Cross-site scripting (XSS) is a client-side code attack carried out by injecting malicious code. Try the cWatch web security to prevent attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#primaryimage\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/xss-prevention.png\",\"contentUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/xss-prevention.png\",\"width\":906,\"height\":300,\"caption\":\"XSS Vulnerabilities Scanner\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cwatch.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is XSS?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#website\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/\",\"name\":\"cWatch Blog\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cwatch.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\",\"name\":\"cWatch Blog\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png\",\"contentUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png\",\"width\":106,\"height\":52,\"caption\":\"cWatch Blog\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g\",\"caption\":\"Admin\"},\"sameAs\":[\"https:\/\/x.com\/seoindia\"],\"url\":\"https:\/\/cwatch.comodo.com\/blog\/author\/seoindia\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is XSS? | XSS Attack | Types of XSS and Prevention Tips","description":"What is XSS attack - Cross-site scripting (XSS) is a client-side code attack carried out by injecting malicious code. Try the cWatch web security to prevent attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/","og_locale":"en_US","og_type":"article","og_title":"What is XSS? | XSS Attack | Types of XSS and Prevention Tips","og_description":"What is XSS attack - Cross-site scripting (XSS) is a client-side code attack carried out by injecting malicious code. Try the cWatch web security to prevent attacks.","og_url":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/","og_site_name":"cWatch Blog","article_published_time":"2022-10-13T15:00:16+00:00","article_modified_time":"2024-07-08T15:35:03+00:00","og_image":[{"width":906,"height":300,"url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/xss-prevention.png","type":"image\/png"}],"author":"Admin","twitter_card":"summary_large_image","twitter_creator":"@seoindia","twitter_misc":{"Written by":"Admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#article","isPartOf":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/"},"author":{"name":"Admin","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d"},"headline":"What is XSS?","datePublished":"2022-10-13T15:00:16+00:00","dateModified":"2024-07-08T15:35:03+00:00","mainEntityOfPage":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/"},"wordCount":809,"commentCount":0,"publisher":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#organization"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#primaryimage"},"thumbnailUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/xss-prevention.png","keywords":["Types of XSS vulnerabilities","What is XSS","XSS attack","XSS Prevention"],"articleSection":["Cyber Attack"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/","url":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/","name":"What is XSS? | XSS Attack | Types of XSS and Prevention Tips","isPartOf":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#primaryimage"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#primaryimage"},"thumbnailUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/xss-prevention.png","datePublished":"2022-10-13T15:00:16+00:00","dateModified":"2024-07-08T15:35:03+00:00","description":"What is XSS attack - Cross-site scripting (XSS) is a client-side code attack carried out by injecting malicious code. Try the cWatch web security to prevent attacks.","breadcrumb":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#primaryimage","url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/xss-prevention.png","contentUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/xss-prevention.png","width":906,"height":300,"caption":"XSS Vulnerabilities Scanner"},{"@type":"BreadcrumbList","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-xss\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwatch.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is XSS?"}]},{"@type":"WebSite","@id":"https:\/\/cwatch.comodo.com\/blog\/#website","url":"https:\/\/cwatch.comodo.com\/blog\/","name":"cWatch Blog","description":"Just another WordPress site","publisher":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwatch.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cwatch.comodo.com\/blog\/#organization","name":"cWatch Blog","url":"https:\/\/cwatch.comodo.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png","contentUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png","width":106,"height":52,"caption":"cWatch Blog"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g","caption":"Admin"},"sameAs":["https:\/\/x.com\/seoindia"],"url":"https:\/\/cwatch.comodo.com\/blog\/author\/seoindia\/"}]}},"_links":{"self":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=1561"}],"version-history":[{"count":32,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1561\/revisions"}],"predecessor-version":[{"id":21381,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1561\/revisions\/21381"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/media\/1562"}],"wp:attachment":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=1561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=1561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=1561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}