When a Checkout Page Leaks Your Session
文章描述了一个WordPress结账页面中的反射型XSS漏洞,该漏洞存在于billing[address]参数中,可能导致会话劫持,威胁用户的敏感信息如地址、邮箱和支付详情。 2026-1-13 06:21:22 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

Breaking Down a Real Reflected XSS in WordPress Checkout Flow

Monika sharma

Press enter or click to view image in full size

Sometimes you open a bug bounty report and immediately know why it matters.

No fancy chains.
No obscure crypto logic.
Just a simple input field doing something it should never do.

When I read HackerOne report #384112, this was exactly that kind of moment. A reflected XSS hiding inside a WordPress checkout page. The kind of place users trust with addresses, emails, and payment details. The kind of place attackers love.

Let’s break it down slowly and practically so you understand not just what happened, but how you can find bugs like this too.

The Report at a Glance

  • Vulnerability type: Reflected XSS
  • Platform: WordPress
  • Affected endpoint: /store/checkout/
  • Vulnerable parameter: billing[address]
  • Impact: Session hijacking via JavaScript execution
  • Report submitted by: arunthelegion

Nothing exotic. But that’s exactly why it’s powerful.

Why Checkout Pages Are High-Value Targets


文章来源: https://infosecwriteups.com/when-a-checkout-page-leaks-your-session-f08885668ae7?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh