Bypass XSS filters and exploit three XSS variants against a live API from Kali Linux:
Filter bypass — the app blocks <script> literally; bypass using <ScRiPt>, <img onerror>, <svg onload>, and attribute injection
Stored XSS — inject a persistent payload into the comments database that executes for every future visitor
DOM XSS — exploit a reflected parameter that would be passed to document.write() in a browser
Open redirect chaining — combine an open redirect with XSS for CSP bypass scenarios
Background
XSS remains in the OWASP Top 10 despite being well-understood because developers continually implement incomplete sanitisation — blocking specific strings while leaving dozens of bypass vectors open.
Real-world examples:
2018 British Airways breach — stored XSS injected into a third-party widget (Modernizr); the skimming script executed on the payment page for 500,000 customers over 15 days. ICO fined £20M.
2020 Twitter — stored XSS in the TweetDeck client allowed account hijacking via self-retweeting payloads. Spread virally to 38,000 accounts before the endpoint was taken down.
2010 Samy worm — MySpace stored XSS spread to 1M profiles in 20 hours via a self-propagating friend-add payload. The first major XSS worm.
2021 Twitch — DOM XSS in stream overlay editor; attacker-controlled URL parameter fed directly into innerHTML without sanitisation.