Stored XSS occurs when malicious input is saved on the server and executed every time a user loads the affected page.
-
Updated
Nov 15, 2025
Stored XSS occurs when malicious input is saved on the server and executed every time a user loads the affected page.
SVG Stored XSS Vulnerable Web App In Python
MISP <= 2.5.27 - Stored Cross-Site Scripting via Workflow Engine (doT.js Template Injection).
cross-site scripting python tool for detection and validation, reflected, DOM and stored
Simple demo project to demonstrate Stored Cross-Site Scripting (XSS) vulnerability using unsanitized blog comments. Includes both vulnerable and fixed versions.
XSS via file upload (pdf)
Advanced Cross-Site Scripting (XSS) vulnerability testing framework with WAF bypass, DOM XSS detection, and comprehensive reporting capabilities.
Node.js-based web application for study
CVE-2020-13654 - XWiki Platform < 12.8 - Stored XSS → CSRF → Account Takeover
WSO2-2020-0731: XXE and XSS vulnerabilities in WSO2 Carbon
MAL-003: Groovy Security Bypass and Stored XSS in Apache OfBiz
CVE-2026-40487 | Postiz <= 2.21.5 | Arbitrary File Upload via MIME-Type Spoofing → Stored XSS → Account Takeover | CVSS 8.9 High
Add a description, image, and links to the stored-xss topic page so that developers can more easily learn about it.
To associate your repository with the stored-xss topic, visit your repo's landing page and select "manage topics."