Lovely Professional University Phagwara, India.
International Journal of Science and Research Archive, 2025, 15(02), 1658–1667
Article DOI: 10.30574/ijsra.2025.15.2.1521
Received on 16 April 2025; revised on 25 May 2025; accepted on 27 May 2025
Cross-Site Scripting (XSS) continues to be a prevalent and damaging vulnerability in web applications, leading attackers to inject harmful scripts that can put personal data at risk, hijack sessions, and change website content. This research provides a comprehensive literature overview of XSS attacks that classify them as stored, reflected, and DOM-based, and discuss how these attacks have evolved as web technology advanced. Traditional detection methods such as input validation and signature-based filters are becoming less and less effective against sophisticated, evasive payloads. As a result, researchers are beginning to utilize Machine Learning (ML) and Deep Learning (DL) methods as more adaptive and intelligent detection methods. This paper reviews different ML/DL models for XSS detection and examines their methods, datasets, feature engineering methods, and metrics for performance. Also pointed out are significant problems such as class imbalance, adversarial examples, and deployment barrier. This study combines current research so that gaps can be identified and future directions described to build effective, scalable, and real-time XSS detection systems. The study also points out that intelligent automation is crucial in protecting web applications against the increasingly sophisticated threat landscape.
XSS; Cross site scripting; Injection
Preview Article PDF
Tenzin Yarphel and Diksha Rani. Cross-Site Scripting (XSS) in Web Applications: A systematic literature review. Cross-Site Scripting (XSS) in Web Applications: A systematic literature review. International Journal of Science and Research Archive, 2025, 15(02), 1658–1667. Article DOI: https://doi.org/10.30574/ijsra.2025.15.2.1521.
Copyright © 2025 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0







