diff --git a/src/pentesting-web/client-side-path-traversal.md b/src/pentesting-web/client-side-path-traversal.md
index 19d81577670..be6b1daeadb 100644
--- a/src/pentesting-web/client-side-path-traversal.md
+++ b/src/pentesting-web/client-side-path-traversal.md
@@ -4,11 +4,31 @@
## Basic Information
-A client side path traversal occurs when you can **manipulate the path of a URL** that is going to be **sent to a user to visit in a legit way** or that a user is somehow going to be **forced to visit for example via JS or CSS**.
+A client side path traversal occurs when you can **manipulate the path of a URL** that is going to be **sent to a user to visit in a legit way** or that a user is somehow going to be **forced to visit for example via JS or CSS**. CSPT is also known as **On-Site Request Forgery (OSRF)** because it lets you coerce the victim’s browser into hitting arbitrary paths on the same origin with their cookies, JWTs, or mTLS certificates.
+
+Typical sources (data you control):
+
+- Route parameters that get concatenated into `fetch()` or XHR paths (React Router, Next.js dynamic routes, Vue router params, Angular `ActivatedRoute`).
+- Stored values (profile slugs, document IDs) that are interpolated into paths inside background jobs, service workers, or WebSocket URLs.
+- UI gadgets (download/export buttons, image galleries) that append user-controlled fragments or file extensions to API endpoints before the request is dispatched.
+
+Typical sinks (where the traversal lands):
+
+- Frontend API wrappers that prepend `/api/` or `/proxy/` and reuse auth headers automatically.
+- `history.pushState` / `router.navigate` helpers that reconstruct URLs later during hydration.
+- ``/`