Hi!
Both this extension and firefox-fastread (which is based on this one) are vulnerable to XSS due to a mishandling of HTML entities, specifically the extension inject part of an element's .innerText in some HTML without encoding certain characters as entities, so for example if there's a <script> it becomes <script> after the extension processes the page.
See https://augustozanellato.github.io/FastReadXSS/poc.html for a PoC
Hi!
Both this extension and firefox-fastread (which is based on this one) are vulnerable to XSS due to a mishandling of HTML entities, specifically the extension inject part of an element's
.innerTextin some HTML without encoding certain characters as entities, so for example if there's a<script>it becomes<script>after the extension processes the page.See https://augustozanellato.github.io/FastReadXSS/poc.html for a PoC