In this journey, I will share my experience with a valid report I submitted. This will be a series until I discover new vulnerabilities. 😊 Let's begin!

This program has a lot of attack surface. It was a single web app, but with user management, different roles, and so on… kind of a SaaS platform.

I found my first stored XSS.

However, there is a feature where a top-level admin is able to share their document with company people. So basically, the admin creates a document on the platform and clicks to share.

But when I intercepted the request, I realized I could change the document link.

So I tried a couple of XSS payloads, but they didn't work. After that, I realized it's kind of an href attribute, and maybe it would work with just this payload.

By the way, I am not an XSS master and client-side attacks.

javascript:alert(1)

When I visited the document and click it on a different account, the XSS popup appeared and worked.

I took a PoC video and prepared the report.

None

Severity downgraded to Low because they have said:

None

πŸ—“ Timeline

04.11.2025 β€” Reported

11.11.2025 β€” Accepted and Reward €€€ (Low)