When a Checkout Page Leaks Your Session
文章描述了WordPress结账页面中的反射型XSS漏洞,通过`billing[address]`参数注入JavaScript代码,可能导致会话劫持。攻击者利用此漏洞在用户信任的敏感信息处理页面发起攻击。 2026-1-13 06:21:22 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

Breaking Down a Real Reflected XSS in WordPress Checkout Flow

Monika sharma

Press enter or click to view image in full size

Sometimes you open a bug bounty report and immediately know why it matters.

No fancy chains.
No obscure crypto logic.
Just a simple input field doing something it should never do.

When I read HackerOne report #384112, this was exactly that kind of moment. A reflected XSS hiding inside a WordPress checkout page. The kind of place users trust with addresses, emails, and payment details. The kind of place attackers love.

Let’s break it down slowly and practically so you understand not just what happened, but how you can find bugs like this too.

The Report at a Glance

  • Vulnerability type: Reflected XSS
  • Platform: WordPress
  • Affected endpoint: /store/checkout/
  • Vulnerable parameter: billing[address]
  • Impact: Session hijacking via JavaScript execution
  • Report submitted by: arunthelegion

Nothing exotic. But that’s exactly why it’s powerful.

Why Checkout Pages Are High-Value Targets


文章来源: https://infosecwriteups.com/when-a-checkout-page-leaks-your-session-f08885668ae7?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh