{"id":3810,"date":"2020-10-14T11:25:00","date_gmt":"2020-10-14T11:25:00","guid":{"rendered":"http:\/\/the-codest.localhost\/blog\/web-app-security-xss-vulnerability\/"},"modified":"2026-04-27T10:24:05","modified_gmt":"2026-04-27T10:24:05","slug":"seguridad-de-aplicaciones-web-vulnerabilidad-xss","status":"publish","type":"post","link":"https:\/\/thecodest.co\/es\/blog\/web-app-security-xss-vulnerability\/","title":{"rendered":"Seguridad de aplicaciones web - Vulnerabilidad XSS"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Escenario de ataque<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>El atacante localiza la vulnerabilidad XSS en un sitio web utilizado por la v\u00edctima, por ejemplo, el sitio web de un banco<\/li>\n\n\n\n<li>La v\u00edctima est\u00e1 actualmente conectada a esta p\u00e1gina<\/li>\n\n\n\n<li>El atacante env\u00eda a la v\u00edctima una URL manipulada<\/li>\n\n\n\n<li>La v\u00edctima hace clic en la URL<\/li>\n\n\n\n<li>En la v\u00edctima <a href=\"https:\/\/thecodest.co\/es\/dictionary\/how-fintech-helps-banks\/\">banco<\/a> sitio web, <a href=\"https:\/\/thecodest.co\/es\/blog\/hire-javascript-developer\/\">JavaScript<\/a> <a href=\"https:\/\/thecodest.co\/es\/dictionary\/what-is-code-refactoring\/\">c\u00f3digo<\/a> comienza a ejecutarse para interceptar el <a href=\"https:\/\/thecodest.co\/es\/blog\/app-data-collection-security-risks-value-and-types-explored\/\">datos<\/a> o ejecutar una transferencia en su nombre a la cuenta del atacante<\/li>\n<\/ol>\n\n\n\n<p>Cabe se\u00f1alar que las operaciones realizadas en nombre de la v\u00edctima pueden ser invisibles para \u00e9sta, ya que pueden tener lugar en segundo plano utilizando el <a href=\"https:\/\/thecodest.co\/es\/blog\/compare-staff-augmentation-firms-that-excel-in-api-team-staffing-for-financial-technology-projects\/\">API<\/a>, o el atacante puede realizarlos posteriormente con los datos necesarios para la autenticaci\u00f3n, tokens, cookies, etc.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tipos de XSS<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. XSS reflejado <\/h3>\n\n\n\n<p>Es aquel en el que el c\u00f3digo HTML\/JavaScript contenido en cualquier par\u00e1metro (por ejemplo, GET, POST o cookie) se muestra en respuesta.<\/p>\n\n\n\n<p>Una p\u00e1gina con una entrada de texto para buscar algo que pone el par\u00e1metro <code>?search=foo<\/code> en la terminaci\u00f3n de la URL al consultar la API. Despu\u00e9s de introducir cualquier frase, si no se encuentra, se coloca un mensaje de retorno en HTML ex.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"markup\" class=\"language-markup\">&lt;div&gt;No se ha encontrado ning&uacute;n resultado para &lt;b&gt;foo&lt;\/b&gt;&lt;\/div&gt;<\/code><\/pre>\n\n\n\n<p>Podemos intentar poner la URL <code>?search=<\/code>..<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2.DOM XSS <\/h3>\n\n\n\n<p>Esto ocurre cuando se habilita su ejecuci\u00f3n mediante el uso de funciones peligrosas en JavaScript, tales como <code>`eval`<\/code> o <code>`innerHtml`<\/code>. El \"Live example\" a continuaci\u00f3n muestra un ataque DOM XSS basado en el archivo <code>`innerHtml`<\/code> funci\u00f3n.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. XSS almacenado <\/h3>\n\n\n\n<p>En este caso, el c\u00f3digo malicioso se escribe en el lado del servidor. Por ejemplo, podemos enviar un comentario con c\u00f3digo malicioso a una entrada de blog que se carga en el servidor. Su cometido es, por ejemplo, esperar la moderaci\u00f3n del administrador para luego robar sus datos de sesi\u00f3n, etc.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">M\u00e9todos de inyecci\u00f3n<\/h2>\n\n\n\n<p>1. En el contenido de la etiqueta<\/p>\n\n\n\n<p><code>`onerror=alert('XSS')`<\/code>en<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code class=\"\">&lt;img src onerror=&quot;alert(&#039;XSS&#039;)&quot; \/&gt;<\/code><\/pre>\n\n\n\n<p>2. En el contenido del atributo<\/p>\n\n\n\n<p><code>`\" onmouseover=alert('XSS')`<\/code> en<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code class=\"\">&lt;div class=&quot;&quot; onmouseover=&quot;alert(&#039;XSS&#039;)&quot;&quot;&gt;&lt;\/div&gt;<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>En el contenido del atributo sin las comillas<\/li>\n<\/ol>\n\n\n\n<p><code>x onclick=alert('XSS')<\/code>en<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code class=\"\">&lt;div class=&quot;x&quot; onclick=&quot;alert(&#039;XSS&#039;)&quot;&gt;&lt;\/div&gt;<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>En el <code>href<\/code>atributo ef<\/li>\n<\/ol>\n\n\n\n<p><code>javascript:alert('XSS')<\/code> en<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"javascript\" class=\"language-javascript\">&lt;a href=&quot;javascript:alert(&#039;XSS&#039;)&quot;&gt;&lt;\/a&gt;<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\">\n<li>En la cadena dentro del c\u00f3digo JavaScript<\/li>\n<\/ol>\n\n\n\n<p><code>\";alert('XSS')\/\/<\/code> en<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code class=\"\">&lt;script&gt;let username=\"\";alert('XSS')\/\/\";&lt;\/script&gt;<\/code><\/pre>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\">\n<li>En el atributo con el evento JavaScript<\/li>\n<\/ol>\n\n\n\n<p><code>&#039;);alert('XSS')\/\/<\/code> donde <code>&#039;<\/code> es una comilla simple, en<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"markup\" class=\"language-markup\">&lt;div onclick=&quot;change(&#039;&amp;#39;);alert(&#039;XSS&#039;)\/\/&#039;)&quot;&gt;John&lt;\/div&gt;<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"7\">\n<li>En el <code>href<\/code> dentro del protocolo JavaScript<\/li>\n<\/ol>\n\n\n\n<p><code>);alert(1)\/\/<\/code> donde <code>%27<\/code> es una comilla simple, en<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code lang=\"javascript\" class=\"language-javascript\">&lt;a href=&quot;javascript:change(&#039;%27);alert(1)\/\/&#039;)&quot;&gt;haga clic en&lt;\/a&gt;<\/code><\/pre>\n\n\n\n<p><code><br> <\/code><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Ejemplo en directo<\/h3>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-codesandbox wp-block-embed-codesandbox\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" title=\"Vulnerabilidad XSS\" width=\"500\" height=\"750\" src=\"https:\/\/codesandbox.io\/embed\/xss-vulnerability-iedok#?secret=JCHK6BCh6d\" data-secret=\"JCHK6BCh6d\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">M\u00e9todos de defensa<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Codificaci\u00f3n de datos mediante funciones incorporadas que se encuentran en muchos <a href=\"https:\/\/thecodest.co\/es\/blog\/top-programming-languages-to-build-e-commerce\/\">lenguajes de programaci\u00f3n<\/a>.<\/li>\n\n\n\n<li>Utilizar sistemas de plantillas con codificaci\u00f3n autom\u00e1tica. La mayor\u00eda de los frameworks populares que utilizan este tipo de sistemas protegen <a href=\"https:\/\/thecodest.co\/es\/blog\/why-us-companies-are-opting-for-polish-developers\/\">us<\/a> de inyecci\u00f3n XSS (<a href=\"https:\/\/thecodest.co\/es\/blog\/hire-django-developers\/\">Django<\/a>Plantillas, <a href=\"https:\/\/thecodest.co\/es\/blog\/hire-vue-js-developers\/\">Vue<\/a>, <a href=\"https:\/\/thecodest.co\/es\/blog\/conditional-component-visibility-in-react\/\">React<\/a> etc.).<\/li>\n\n\n\n<li>No utilice funciones como <code>eval\u00fae<\/code> o <code>Funci\u00f3n<\/code> con datos de usuarios no fiables.<\/li>\n\n\n\n<li>No utilice funciones y propiedades que asignen c\u00f3digo HTML directamente a los elementos del \u00e1rbol DOM, por ejemplo <code>innerHTML<\/code>, <code>outerHTML<\/code>, <code>insertAdjacentHTML<\/code>, <code>ocumento.escribir<\/code>. En su lugar, puede utilizar funciones que asignen texto directamente a estos elementos, como <code>textoContenido<\/code> o <code>innerText<\/code>.<\/li>\n\n\n\n<li>Tenga cuidado cuando redirija al usuario a una URL que est\u00e9 bajo su control. Riesgo de inyecci\u00f3n <code>location = 'javascript('XSS')'<\/code>.<\/li>\n\n\n\n<li>Filtrar HTML utilizando bibliotecas como <code>DOMPurificar<\/code>.<\/li>\n\n\n\n<li>Tenga cuidado al cargar <code>.html<\/code> o <code>.svg<\/code> archivos. Puede crear un dominio independiente desde el que se servir\u00e1n los archivos cargados.<\/li>\n\n\n\n<li>Utilice la <code>Pol\u00edtica de seguridad de contenidos<\/code> mecanismo.<\/li>\n\n\n\n<li> <span style=\"font-size: revert; color: initial; font-family: -apple-system, BlinkMacSystemFont, &quot;Segoe UI&quot;, Roboto, Oxygen-Sans, Ubuntu, Cantarell, &quot;Helvetica Neue&quot;, sans-serif;\">Eche un vistazo a los filtros anti-XSS integrados en los navegadores m\u00e1s populares.<\/span> <p><strong>Si te parece interesante este art\u00edculo, sigue a Lukasz en Github:<\/strong> https:\/\/github.com\/twistezo<\/p> <\/li>\n<\/ol>\n\n\n\n<p><strong>M\u00e1s informaci\u00f3n:<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/thecodest.co\/blog\/data-fetching-strategies-in-nextjs\/\">Estrategias de obtenci\u00f3n de datos en NextJS<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/thecodest.co\/blog\/rails-api-cors-dash-of-consciousness\/\">API de Rails y CORS. Una pizca de conciencia<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/thecodest.co\/blog\/why-you-should-probably-use-typescript\/\">\u00bfPor qu\u00e9 deber\u00eda (probablemente) utilizar Typescript?<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Los ataques XSS permiten a los atacantes inyectar scripts del lado del cliente en p\u00e1ginas web vistas por otros usuarios. Los principales efectos de esta vulnerabilidad son la posibilidad de ejecutar cualquier acci\u00f3n en el contexto del usuario conectado, y de leer cualquier dato en el contexto del usuario conectado.<\/p>","protected":false},"author":2,"featured_media":3809,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-3810","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software-development"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Web app security - XSS vulnerability - The Codest<\/title>\n<meta name=\"description\" content=\"Enhance your knowledge of web app security. Discover how XSS attacks can affect bank transactions and user safety.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/thecodest.co\/es\/blog\/seguridad-de-aplicaciones-web-vulnerabilidad-xss\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Web app security - XSS vulnerability\" \/>\n<meta property=\"og:description\" content=\"Enhance your knowledge of web app security. Discover how XSS attacks can affect bank transactions and user safety.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/thecodest.co\/es\/blog\/seguridad-de-aplicaciones-web-vulnerabilidad-xss\/\" \/>\n<meta property=\"og:site_name\" content=\"The Codest\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-14T11:25:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-27T10:24:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/web-app-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"thecodest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"thecodest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-xss-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-xss-vulnerability\\\/\"},\"author\":{\"name\":\"thecodest\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/person\\\/7e3fe41dfa4f4e41a7baad4c6e0d4f76\"},\"headline\":\"Web app security &#8211; XSS vulnerability\",\"datePublished\":\"2020-10-14T11:25:00+00:00\",\"dateModified\":\"2026-04-27T10:24:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-xss-vulnerability\\\/\"},\"wordCount\":528,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-xss-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/web-app-security.png\",\"articleSection\":[\"Software Development\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-xss-vulnerability\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-xss-vulnerability\\\/\",\"url\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-xss-vulnerability\\\/\",\"name\":\"Web app security - XSS vulnerability - The Codest\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-xss-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-xss-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/web-app-security.png\",\"datePublished\":\"2020-10-14T11:25:00+00:00\",\"dateModified\":\"2026-04-27T10:24:05+00:00\",\"description\":\"Enhance your knowledge of web app security. Discover how XSS attacks can affect bank transactions and user safety.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-xss-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-xss-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-xss-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/web-app-security.png\",\"contentUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/05\\\/web-app-security.png\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/blog\\\/web-app-security-xss-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/thecodest.co\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Web app security &#8211; XSS vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#website\",\"url\":\"https:\\\/\\\/thecodest.co\\\/\",\"name\":\"The Codest\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/thecodest.co\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#organization\",\"name\":\"The Codest\",\"url\":\"https:\\\/\\\/thecodest.co\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/03\\\/thecodest-logo.svg\",\"contentUrl\":\"https:\\\/\\\/thecodest.co\\\/app\\\/uploads\\\/2024\\\/03\\\/thecodest-logo.svg\",\"width\":144,\"height\":36,\"caption\":\"The Codest\"},\"image\":{\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/pl.linkedin.com\\\/company\\\/codest\",\"https:\\\/\\\/clutch.co\\\/profile\\\/codest\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/thecodest.co\\\/#\\\/schema\\\/person\\\/7e3fe41dfa4f4e41a7baad4c6e0d4f76\",\"name\":\"thecodest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g\",\"caption\":\"thecodest\"},\"url\":\"https:\\\/\\\/thecodest.co\\\/es\\\/author\\\/thecodest\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Seguridad de aplicaciones web - Vulnerabilidad XSS - The Codest","description":"Mejore sus conocimientos sobre la seguridad de las aplicaciones web. Descubra c\u00f3mo los ataques XSS pueden afectar a las transacciones bancarias y a la seguridad de los usuarios.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/thecodest.co\/es\/blog\/seguridad-de-aplicaciones-web-vulnerabilidad-xss\/","og_locale":"es_ES","og_type":"article","og_title":"Web app security - XSS vulnerability","og_description":"Enhance your knowledge of web app security. Discover how XSS attacks can affect bank transactions and user safety.","og_url":"https:\/\/thecodest.co\/es\/blog\/seguridad-de-aplicaciones-web-vulnerabilidad-xss\/","og_site_name":"The Codest","article_published_time":"2020-10-14T11:25:00+00:00","article_modified_time":"2026-04-27T10:24:05+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/web-app-security.png","type":"image\/png"}],"author":"thecodest","twitter_card":"summary_large_image","twitter_misc":{"Written by":"thecodest","Est. reading time":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/thecodest.co\/blog\/web-app-security-xss-vulnerability\/#article","isPartOf":{"@id":"https:\/\/thecodest.co\/blog\/web-app-security-xss-vulnerability\/"},"author":{"name":"thecodest","@id":"https:\/\/thecodest.co\/#\/schema\/person\/7e3fe41dfa4f4e41a7baad4c6e0d4f76"},"headline":"Web app security &#8211; XSS vulnerability","datePublished":"2020-10-14T11:25:00+00:00","dateModified":"2026-04-27T10:24:05+00:00","mainEntityOfPage":{"@id":"https:\/\/thecodest.co\/blog\/web-app-security-xss-vulnerability\/"},"wordCount":528,"commentCount":0,"publisher":{"@id":"https:\/\/thecodest.co\/#organization"},"image":{"@id":"https:\/\/thecodest.co\/blog\/web-app-security-xss-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/web-app-security.png","articleSection":["Software Development"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/thecodest.co\/blog\/web-app-security-xss-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/thecodest.co\/blog\/web-app-security-xss-vulnerability\/","url":"https:\/\/thecodest.co\/blog\/web-app-security-xss-vulnerability\/","name":"Seguridad de aplicaciones web - Vulnerabilidad XSS - The Codest","isPartOf":{"@id":"https:\/\/thecodest.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/thecodest.co\/blog\/web-app-security-xss-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/thecodest.co\/blog\/web-app-security-xss-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/web-app-security.png","datePublished":"2020-10-14T11:25:00+00:00","dateModified":"2026-04-27T10:24:05+00:00","description":"Mejore sus conocimientos sobre la seguridad de las aplicaciones web. Descubra c\u00f3mo los ataques XSS pueden afectar a las transacciones bancarias y a la seguridad de los usuarios.","breadcrumb":{"@id":"https:\/\/thecodest.co\/blog\/web-app-security-xss-vulnerability\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/thecodest.co\/blog\/web-app-security-xss-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/thecodest.co\/blog\/web-app-security-xss-vulnerability\/#primaryimage","url":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/web-app-security.png","contentUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/05\/web-app-security.png","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/thecodest.co\/blog\/web-app-security-xss-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/thecodest.co\/"},{"@type":"ListItem","position":2,"name":"Web app security &#8211; XSS vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/thecodest.co\/#website","url":"https:\/\/thecodest.co\/","name":"The Codest","description":"","publisher":{"@id":"https:\/\/thecodest.co\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/thecodest.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/thecodest.co\/#organization","name":"The Codest","url":"https:\/\/thecodest.co\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/thecodest.co\/#\/schema\/logo\/image\/","url":"https:\/\/thecodest.co\/app\/uploads\/2024\/03\/thecodest-logo.svg","contentUrl":"https:\/\/thecodest.co\/app\/uploads\/2024\/03\/thecodest-logo.svg","width":144,"height":36,"caption":"The Codest"},"image":{"@id":"https:\/\/thecodest.co\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pl.linkedin.com\/company\/codest","https:\/\/clutch.co\/profile\/codest"]},{"@type":"Person","@id":"https:\/\/thecodest.co\/#\/schema\/person\/7e3fe41dfa4f4e41a7baad4c6e0d4f76","name":"thecodest","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5dbfe6a1e8c86e432e8812759e34e6fe82ebac75119ae3237a6c1311fa19caf4?s=96&d=mm&r=g","caption":"thecodest"},"url":"https:\/\/thecodest.co\/es\/author\/thecodest\/"}]}},"_links":{"self":[{"href":"https:\/\/thecodest.co\/es\/wp-json\/wp\/v2\/posts\/3810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecodest.co\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecodest.co\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecodest.co\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thecodest.co\/es\/wp-json\/wp\/v2\/comments?post=3810"}],"version-history":[{"count":9,"href":"https:\/\/thecodest.co\/es\/wp-json\/wp\/v2\/posts\/3810\/revisions"}],"predecessor-version":[{"id":8105,"href":"https:\/\/thecodest.co\/es\/wp-json\/wp\/v2\/posts\/3810\/revisions\/8105"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thecodest.co\/es\/wp-json\/wp\/v2\/media\/3809"}],"wp:attachment":[{"href":"https:\/\/thecodest.co\/es\/wp-json\/wp\/v2\/media?parent=3810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecodest.co\/es\/wp-json\/wp\/v2\/categories?post=3810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecodest.co\/es\/wp-json\/wp\/v2\/tags?post=3810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}