Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 690

Mixed Content

What is Mixed Content?

Mixed ContentSituation where an HTTPS page loads subresources (scripts, styles, images, XHR) over plain HTTP, weakening the page's overall security guarantees.


Mixed content occurs when a page served over HTTPS pulls in scripts, stylesheets, images, fonts, or fetch requests from insecure http:// URLs. Active mixed content (scripts, iframes, XHR) is dangerous because an on-path attacker can rewrite the response and inject code into the secure context, breaking confidentiality and integrity. Modern browsers block active mixed content by default and may auto-upgrade or block passive content like images. Defences include serving all assets over HTTPS, using protocol-relative or absolute https:// URLs, the upgrade-insecure-requests CSP directive, and HSTS to force HTTPS site-wide.

Examples

  1. 01

    An HTTPS checkout page that pulls a third-party analytics script over http:// can be hijacked to skim card data.

  2. 02

    Browser console warning: "Mixed Content: The page was loaded over HTTPS, but requested an insecure script."

Frequently asked questions

What is Mixed Content?

Situation where an HTTPS page loads subresources (scripts, styles, images, XHR) over plain HTTP, weakening the page's overall security guarantees. It belongs to the Application Security category of cybersecurity.

What does Mixed Content mean?

Situation where an HTTPS page loads subresources (scripts, styles, images, XHR) over plain HTTP, weakening the page's overall security guarantees.

How does Mixed Content work?

Mixed content occurs when a page served over HTTPS pulls in scripts, stylesheets, images, fonts, or fetch requests from insecure http:// URLs. Active mixed content (scripts, iframes, XHR) is dangerous because an on-path attacker can rewrite the response and inject code into the secure context, breaking confidentiality and integrity. Modern browsers block active mixed content by default and may auto-upgrade or block passive content like images. Defences include serving all assets over HTTPS, using protocol-relative or absolute https:// URLs, the upgrade-insecure-requests CSP directive, and HSTS to force HTTPS site-wide.

How do you defend against Mixed Content?

Defences for Mixed Content typically combine technical controls and operational practices, as detailed in the full definition above.

Related terms