Entities allowed between slashes using XSS type
This is an example how you can use the XSS type to fuzz URLs. It uses a base tag to get round the sandboxed iframe problems.
Created byhackvertor
Created Jan 16, 2025
Updated May 27, 2025
Detecting browser...
CategoryEntity Parsing
VisibilityPublic
TypeXSS
CharsetUTF-8
$[data1] placeholderhtml_entities
Code used before fuzz:
<script>window.onerror=x=>true;</script>0x0D
<base href="https://example.com" />Template used:
<a href="/$[data1]/example2.com" id=x></a>Code used after fuzz:
x.host === "example2.com" && log('$[data1]')Sample payloads
<a href="/\/example2.com" id=x></a><a href="/
/example2.com" id=x></a><a href="///example2.com" id=x></a><a href="/	/example2.com" id=x></a>Fuzz results
Chrome 144.0.0.0 desktop macOS 10.15.7
Updated
Wed Jan 28 2026
Found 4 results
Loading...
Firefox 147.0 desktop Linux
Updated
Sun Feb 01 2026
Found 4 results
Loading...
Firefox 134.0 desktop macOS 10.15older version
Updated
Thu Jan 16 2025
Found 4 results
Loading...
Microsoft Edge 144.0.0.0 desktop Windows NT 10.0
Updated
Fri Jan 30 2026
Found 4 results
Loading...
Safari 18.2 desktop macOS 10.15.7
Updated
Fri Jan 17 2025
Found 4 results
Loading...
Safari 18.2 mobile iOS 18.2.1
Updated
Thu Jan 16 2025
Found 4 results
Loading...