Entities allowed before slashes which result in an external URL
This is an example how you can use the XSS type to fuzz URLs. This one fuzzes entities before double slashes. It uses a base tag to get round the sandboxed iframe problems.
Created byhackvertor
Created Jan 16, 2025
Updated May 27, 2025
Detecting browser...
CategoryEntity Parsing
VisibilityPublic
TypeXSS
CharsetUTF-8
$[data1] placeholderhtml_entities
Code used before fuzz:
<script>window.onerror=x=>true;</script>0x0D
<base href="https://example.com" />Template used:
<a href="$[data1]//example2.com" id=x></a>Code used after fuzz:
x.protocol === 'https:' && x.host === "example2.com" && log('$[data1]')Sample payloads
<a href="\//example2.com" id=x></a><a href="
//example2.com" id=x></a><a href="///example2.com" id=x></a><a href="	//example2.com" id=x></a>Fuzz results
Chrome 148.0.0.0 desktop Windows NT 10.0
Updated15 Mar 2026
Found 4 results
Loading...
Chrome 145.0.0.0 desktop macOS 10.15.7older version
Updated17 Feb 2026
Found 4 results
Loading...
Firefox 148.0 desktop Windows NT 10.0
Updated23 Feb 2026
Found 4 results
Loading...
Firefox 147.0 desktop Linuxolder version
Updated1 Feb 2026
Found 4 results
Loading...
Firefox 134.0 desktop macOS 10.15older version
Updated16 Jan 2025
Found 4 results
Loading...
Microsoft Edge 145.0.0.0 desktop Windows NT 10.0
Updated18 Feb 2026
Found 4 results
Loading...
Safari 18.5 mobile iOS 18.5
Updated28 May 2025
Found 4 results
Loading...
Safari 18.2 mobile iOS 18.2.1older version
Updated16 Jan 2025
Found 4 results
Loading...
Safari 18.2 desktop macOS 10.15.7older version
Updated17 Jan 2025
Found 4 results
Loading...