Hi There, Azon Dominator is vulnerable to an HTML Injection vulnerability in its search functionality. The issue arises due to insufficient input validation in the q parameter, allowing an attacker to inject arbitrary HTML elements. This could lead to potential security risks such as content manipulation or phishing attacks. Source URL: https://azon-dominator.webister.net/ Source Name: Seyfullah Kılıç Software URL: https://azon-dominator.webister.net/ *Proof of Concept (PoC):* Vulnerable Endpoint: URL: https://azon-dominator.webister.net/searchurl?q= Method: GET Parameter Affected: q Vulnerability Type: Reflected XSS / HTML Injection *Payload Example:* test *Request Example:* GET /search?q=%3Ca%20href=%22javas\x00cript:javascript:alert(1)%22%20id=%22fuzzelement1%22%3Etest%3C/a%3E HTTP/2 Host: azon-dominator.webister.net Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 This vulnerability allows an attacker to inject arbitrary HTML content into the search query, potentially leading to security risks such as content spoofing or malicious script injection. Regards. -- *Seyfullah KILIÇ* *CEO - Founder*