Password reset poisoning via dangling markup


1️⃣ Leaving the <img> tag open

  • Some websites block malicious JavaScript.

  • If you don’t close the <img> tag, the browser may auto-complete it incorrectly and execute your script.

  • Example:

    <img src=x onerror=alert('XSS')

2️⃣ Using ?/ in URLs

  • Some websites don’t handle URLs correctly.

  • Adding ?/ might trick the website into returning more data than expected.

  • Example:

    <https://example.com/email?/>

This might expose all emails instead of just one!

Last updated