Loading HuntDB...

Stored XSS in Email Templates via link

Medium
J
Judge.me
Submitted None
Reported by rioncool22

Vulnerability Details

Technical details and impact analysis

Cross-site Scripting (XSS) - Stored
## Summary: Stored cross-site scripting (also known as second-order or persistent XSS) arises when an application receives data from an untrusted source and includes that data within its later HTTP responses in an unsafe way. ## FYI: I Install judge.me in Shopify E-Commerce ## Steps To Reproduce: 1. Go to `Requests > Email Templates` {F1488407} 2. Click `New Templates` {F1488408} 3. Edit this block {F1488410} 4. Insert Link with XSS payload (See image below) {F1488413} 5. Then save email 6. To trigger the XSS, you can click `Click Here` text {F1488415} ## Impact Session Hijacking, Cookie Stealing

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Bounty

$500.00

Submitted

Weakness

Cross-site Scripting (XSS) - Stored