The malicious scripts or link can be injected through XSS or social engineering. The victim (can be user or admin) will be forced to perform unwanted actions on their authenticated application, such as transferring funds, changing email address, etc. (Identity inheritance is the key, using the user’s session cookie, IP address, credentials, and so forth)
- 1 more item...