Skip to content

Request Forgery: CSRF Get Based

Identifier: frontend_csrf_get_based

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner ASM Scanner

Description

GET-based CSRF vulnerabilities occur when frontend applications accept state-changing actions via GET requests, allowing attackers to trick authenticated users' browsers into making unintended requests.

How we test: We identify frontend GET endpoints that perform state-changing operations and test if they can be exploited via cross-site requests. We check if CSRF protection mechanisms such as tokens or same-site cookies are properly implemented to prevent unauthorized actions.

References:

Configuration

Example

Example configuration:

---
security_tests:
  frontend_csrf_get_based:
    skip: false

Reference

skip

Type : boolean

Skip the test if true.