### [CVE-2015-9545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9545) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStorage.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages. ### POC #### Reference - https://github.com/ofirdagan/cross-domain-local-storage/issues/17 - https://github.com/ofirdagan/cross-domain-local-storage/pull/19 - https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client #### Github No PoCs found on GitHub currently.