This starts by an attacker crafting a malicious email and then encouraging a user to click it. The malicious URL is often placed within a phishing email, but it could also be placed on a public website, such as a link within a comment. When the user clicks the malicious URL, it sends an HTTP request to a server with the user's cookie which the attacker can use to hijack the user/admin account through what's called session hijacking. To summarize, an attacker needs to trick a victim into clicking a URL to execute their malicious payload.
Entry points
Parameters in the URL Query String
URL File Path
Sometimes HTTP Headers
Search Fields
Comments section
Contact Forms
Example Payloads
JS
<script>alert("Hello")</script><script>alert(window.location.hostname)</script>"><script>alert('XSS');</script>[suitable for escaping input tags]<textarea><script>alert('THM');</script>[suitable for escaping text areas]';alert('Hi_There');//'