{"id":21996,"date":"2024-01-29T10:17:56","date_gmt":"2024-01-29T08:17:56","guid":{"rendered":"https:\/\/wpbeveiligen.nl\/?p=21996"},"modified":"2023-07-27T10:19:09","modified_gmt":"2023-07-27T08:19:09","slug":"wat-is-xss-alles-over-cross-site-scripting-2","status":"publish","type":"post","link":"https:\/\/wpbeveiligen.nl\/en\/wat-is-xss-alles-over-cross-site-scripting-2\/","title":{"rendered":"Wat is XSS? Alles over: Cross Site Scripting"},"content":{"rendered":"

Cross Site Scripting (XSS) becomes possible when forms are not properly closed or do not filter the information you can enter.<\/strong><\/p>\n

The term “XSS” stands for Cross Site Scripting, and it was adapted because “CSS” (Cascading Style Sheets) already existed.<\/p>\n

How does Cross Site Scripting work?<\/h2>\n

When a form does not use “htmlspecialchars,” and all characters entered in an input field can be fully processed, it gives the opportunity to execute PHP on the website\/server.<\/p>\n

Through XSS, you can issue commands to the server. Consider what you can do with that capability\u2014modifying, saving, executing files, and other tasks that are typically limited to website administrators.<\/p>\n

What are the disadvantages if someone successfully executes Cross Site Scripting on your website?<\/h2>\n
    \n
  1. Your website’s appearance can be modified.<\/li>\n
  2. Pages that were meant to be private or for paid users only may become visible.<\/li>\n
  3. Information from you and your visitors can be stolen (e.g., information in cookies).<\/li>\n
  4. Phishing code can be added to your site, resulting in a quick Google ban.<\/li>\n
  5. Trojans can be offered to visitors’ computers without your knowledge.<\/li>\n
  6. Keystrokes on the keyboard can be logged (e.g., what you type when logging into your bank’s website).<\/li>\n
  7. Your browser can crash due to a forced error overload.<\/li>\n
  8. And more…<\/li>\n<\/ol>\n

    Beyond website modifications, XSS also impacts your browser\/computer<\/h2>\n

    – Through the browser, the webcam can be activated, and a recording started.
    \n– Listening through the microphone is possible.
    \n– Files can be saved.
    \nAnd so on…<\/p>\n

    I’ve never encountered XSS as a visitor to websites… have I?<\/h2>\n

    Have you seen the popup: “Do you want to leave this page?” In many cases, you can click [x] to close it. However, if you cannot close it and you find yourself on a website that isn’t very trustworthy, assume that there are pieces of code under the “leave page” and “go back” buttons that you’d rather not execute on your PC.<\/p>\n

    In such cases, it’s best to close the browser completely! (Use Task Manager in Windows to end the browser process)<\/p>\n

    How do I prevent XSS issues on my WordPress website?<\/h2>\n

    You can check the WPscan database<\/a> to see if any of your plugins have vulnerabilities.
    \nKeeping WordPress up-to-date is essential, especially if it’s not properly secured. WordPress sometimes updates twice a month when Cross Site Scripting vulnerabilities are found!<\/p>\n

    The best practice is to ensure that your WordPress website is secured<\/a>. When your website is secure and a hacker or script cannot easily place or modify files, you prevent a significant portion of potential issues.<\/p>\n","protected":false},"excerpt":{"rendered":"

    Cross Site Scripting (XSS) becomes possible when forms are not properly closed or do not filter the information you can enter. The term “XSS” stands for Cross Site Scripting, and it was adapted because “CSS” (Cascading Style Sheets) already existed. How does Cross Site Scripting work? When a form does not use “htmlspecialchars,” and all […]<\/p>\n","protected":false},"author":4,"featured_media":661,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[186,167],"tags":[],"_links":{"self":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/posts\/21996"}],"collection":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/comments?post=21996"}],"version-history":[{"count":1,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/posts\/21996\/revisions"}],"predecessor-version":[{"id":23105,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/posts\/21996\/revisions\/23105"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/media\/661"}],"wp:attachment":[{"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/media?parent=21996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/categories?post=21996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpbeveiligen.nl\/wp-json\/wp\/v2\/tags?post=21996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}