Entities allowed before slashes which result in an external URL
This is an example how you can use the XSS type to fuzz URLs. This one fuzzes entities before double slashes. It uses a base tag to get round the sandboxed iframe problems.
Created byhackvertor
Created Jan 16, 2025
Updated May 27, 2025
Detecting browser...
CategoryEntity Parsing
VisibilityPublic
TypeXSS
CharsetUTF-8
$[data1] placeholderhtml_entities
Code used before fuzz:
<script>window.onerror=x=>true;</script>0x0D
<base href="https://example.com" />Template used:
<a href="$[data1]//example2.com" id=x></a>Code used after fuzz:
x.protocol === 'https:' && x.host === "example2.com" && log('$[data1]')Sample payloads
<a href="\//example2.com" id=x></a><a href="
//example2.com" id=x></a><a href="///example2.com" id=x></a><a href="	//example2.com" id=x></a>Fuzz results
Chrome 144.0.0.0 desktop Windows NT 10.0
Updated28 Jan 2026
Found 4 results
Loading...
Chrome 132.0.0.0 desktop macOS 10.15.7older version
Updated17 Jan 2025
Found 4 results
Loading...
Firefox 147.0 desktop Linux
Updated1 Feb 2026
Found 4 results
Loading...
Firefox 134.0 desktop macOS 10.15older version
Updated16 Jan 2025
Found 4 results
Loading...
Microsoft Edge 144.0.0.0 desktop Windows NT 10.0
Updated31 Jan 2026
Found 4 results
Loading...
Safari 18.5 mobile iOS 18.5
Updated28 May 2025
Found 4 results
Loading...
Safari 18.2 mobile iOS 18.2.1older version
Updated16 Jan 2025
Found 4 results
Loading...
Safari 18.2 desktop macOS 10.15.7older version
Updated17 Jan 2025
Found 4 results
Loading...