Skip to content

Security Test: XSS via Domain Takeover

Description

Default Severity:

This vulnerability happens when an attacker takes control of a trusted domain—often due to misconfigurations, outdated services, or DNS issues—and uses it to inject harmful scripts into web pages. When users visit these pages, the malicious code runs automatically, which can lead to stolen credentials, hijacked sessions, or other forms of data theft. Developers often fall into traps like neglecting to properly secure external or legacy domains, or failing to monitor DNS configurations regularly. This attack is especially dangerous because it doesn't require users to click or interact, and it exploits the trust users have in a valid-looking domain.

Configuration

Identifier: configuration/xss_via_domain_takeover

Examples

All configuration available:

checks:
  configuration/xss_via_domain_takeover:
    skip: false # default

Compliance and Standards

Standard Value
OWASP API Top 10 API8:2023
OWASP LLM Top 10 LLM05:2023
PCI DSS 6.1
GDPR Article-32
SOC2 CC9
PSD2 Article-95
ISO 27001 A.12.6
NIST SP800-81-2
FedRAMP SC-20
CWE 284
CVSS Vector AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS Score 3.0