Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 224

CORS Misconfiguration

What is CORS Misconfiguration?

CORS MisconfigurationAn insecure CORS policy that allows untrusted origins to read authenticated responses, often by reflecting the Origin header and returning Access-Control-Allow-Credentials: true.


CORS misconfiguration occurs when a server implements Cross-Origin Resource Sharing in a way that effectively disables the same-origin policy. Common mistakes include reflecting any Origin in Access-Control-Allow-Origin, allowing 'null' origins, whitelisting wildcard subdomains, or combining Allow-Origin: * with Allow-Credentials: true (rejected by browsers but often misimplemented). An attacker hosts a page that issues authenticated cross-origin requests; because the response is now readable, sensitive data such as session tokens, account details, or API responses can be exfiltrated. Defenses include strict origin allow-lists, rejecting Origin reflection, and never combining credentials with broad wildcards.

Examples

  1. 01

    Server returns Access-Control-Allow-Origin: https://attacker.com when the request's Origin header is attacker.com.

  2. 02

    API allows Access-Control-Allow-Origin: null which can be triggered from sandboxed iframes.

Frequently asked questions

What is CORS Misconfiguration?

An insecure CORS policy that allows untrusted origins to read authenticated responses, often by reflecting the Origin header and returning Access-Control-Allow-Credentials: true. It belongs to the Attacks & Threats category of cybersecurity.

What does CORS Misconfiguration mean?

An insecure CORS policy that allows untrusted origins to read authenticated responses, often by reflecting the Origin header and returning Access-Control-Allow-Credentials: true.

How does CORS Misconfiguration work?

CORS misconfiguration occurs when a server implements Cross-Origin Resource Sharing in a way that effectively disables the same-origin policy. Common mistakes include reflecting any Origin in Access-Control-Allow-Origin, allowing 'null' origins, whitelisting wildcard subdomains, or combining Allow-Origin: * with Allow-Credentials: true (rejected by browsers but often misimplemented). An attacker hosts a page that issues authenticated cross-origin requests; because the response is now readable, sensitive data such as session tokens, account details, or API responses can be exfiltrated. Defenses include strict origin allow-lists, rejecting Origin reflection, and never combining credentials with broad wildcards.

How do you defend against CORS Misconfiguration?

Defences for CORS Misconfiguration typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for CORS Misconfiguration?

Common alternative names include: Permissive CORS.

Related terms

See also