Fix GuideInjection

How to Fix CWE-79: Cross-Site Scripting (XSS)

Verified by Precogs Threat Research

The application includes untrusted data in web pages without proper validation or escaping, allowing attackers to execute scripts in victim browsers.

⚠️ Impact if Unpatched

Session hijacking, credential theft, defacement, malware distribution, phishing.

Step-by-Step Remediation

  1. Encode all user output using context-appropriate encoding (HTML, JavaScript, URL, CSS)
  2. Implement Content Security Policy (CSP) headers
  3. Use framework auto-escaping (React JSX, Angular templates)
  4. Validate and sanitize input on the server side
  5. Use HttpOnly and Secure flags on session cookies

Code Example

❌ Vulnerable

// VULNERABLE: Direct insertion of user input
element.innerHTML = userInput;

✅ Fixed

// SAFE: Use textContent (auto-escapes)
element.textContent = userInput;
// Or use DOMPurify for HTML content
element.innerHTML = DOMPurify.sanitize(userInput);

Don't just patch one instance.

Scan your entire codebase for all instances of Cross-Site Scripting (XSS).

Scan for Free with Precogs AI →

Recent Vulnerabilities (CWE-79)

180 vulnerabilities in our database match Cross-Site Scripting (XSS).

View all 180 vulnerabilities →