Direct innerHTML Assignment with User Input
Applications that directly assign user-controlled data to innerHTML without proper sanitization or encoding.
Preview example – JAVASCRIPT
// User input from form or URL parameter
const userContent = document.getElementById('userInput').value;
// Vulnerable: Direct assignment to innerHTML
document.getElementById('content').innerHTML = userContent;
// Another vulnerable pattern
function displayMessage(message) {
// Attacker can inject: <img src=x onerror=alert('XSS')>
document.querySelector('.message').innerHTML = message;
}