Is it acceptable to ignore potential XSS payloads if they are not executed on our side?

I’m responsible for a web application where users can upload a file containing data in a specific syntax, which then automatically fills out a form instead of requiring manual input.
The issue is that it’s possible to include a malicious s… Continue reading Is it acceptable to ignore potential XSS payloads if they are not executed on our side?

XSS CTF – How to execute payload inside an HTML comment (blacklisted words & encoded characters)

I’m trying to solve a CTF challenge that requires me to obtain the admin cookie through XSS. Here’s the situation:
-Main form: When I enter any input, it gets reflected in the page, but it is inserted inside an HTML comment. For example, i… Continue reading XSS CTF – How to execute payload inside an HTML comment (blacklisted words & encoded characters)

Jinja2: safe from XSS/SSTI if using select_autoescape and context dictionary?

In a FlaskRestX API for an e-commerce site, I use jinja2 to generate a HTML template (to create a PDF purchase receipt). After reading the docs, and asking various AI models, I am still not convinced that my code is safe from XSS (Cross-Si… Continue reading Jinja2: safe from XSS/SSTI if using select_autoescape and context dictionary?