JSON Web Tokens can be susceptible to ________ attacks if the token is not properly validated.

  • CSRF (Cross-Site Request Forgery)
  • DDoS (Distributed Denial of Service)
  • SQL Injection
  • XSS (Cross-Site Scripting)
JSON Web Tokens (JWTs) can be susceptible to XSS (Cross-Site Scripting) attacks if the token is not properly validated. An attacker can inject malicious scripts into a web page, and if the web application doesn't validate the token correctly, it can execute the script within the context of the user's session.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *