<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>appsec.fyi — CSRF</title>
  <link>https://appsec.fyi/csrf.html</link>
  <description>Curated CSRF resources from appsec.fyi</description>
  <language>en-us</language>
  <atom:link href="https://appsec.fyi/feeds/csrf.xml" rel="self" type="application/rss+xml"/>
  <lastBuildDate>Sun, 12 Apr 2026 16:40:01 +0000</lastBuildDate>
  <managingEditor>carl@chs.us (Carl Sampson)</managingEditor>
  <item>
    <title>Web Application Security: Anti-CSRF &amp; Cookie SameSite Options</title>
    <link>https://www.bitsight.com/blog/web-application-security-devops-anti-csrf-and-cookie-samesite-options</link>
    <guid isPermaLink="true">https://www.bitsight.com/blog/web-application-security-devops-anti-csrf-and-cookie-samesite-options</guid>
    <description>Web Application Security: Anti-CSRF &amp; Cookie SameSite Options</description>
    <category>CSRF</category>
    <pubDate>Fri, 10 Apr 2026 01:56:25 +0000</pubDate>
  </item>
  <item>
    <title>CSRF Protection - Clerk Docs</title>
    <link>https://clerk.com/docs/guides/secure/best-practices/csrf-protection</link>
    <guid isPermaLink="true">https://clerk.com/docs/guides/secure/best-practices/csrf-protection</guid>
    <description>CSRF Protection - Clerk Docs</description>
    <category>CSRF</category>
    <pubDate>Fri, 10 Apr 2026 01:56:24 +0000</pubDate>
  </item>
  <item>
    <title>Preventing CSRF with the SameSite Cookie Attribute</title>
    <link>https://www.invicti.com/blog/web-security/same-site-cookie-attribute-prevent-cross-site-request-forgery</link>
    <guid isPermaLink="true">https://www.invicti.com/blog/web-security/same-site-cookie-attribute-prevent-cross-site-request-forgery</guid>
    <description>Preventing CSRF with the SameSite Cookie Attribute</description>
    <category>CSRF</category>
    <pubDate>Fri, 10 Apr 2026 01:56:24 +0000</pubDate>
  </item>
  <item>
    <title>CSRF Attacks: Bypassing SameSite Cookies</title>
    <link>https://blog.cybersamir.com/csrf-attacks-bypassing-samesite-cookies/</link>
    <guid isPermaLink="true">https://blog.cybersamir.com/csrf-attacks-bypassing-samesite-cookies/</guid>
    <description>CSRF Attacks: Bypassing SameSite Cookies</description>
    <category>CSRF</category>
    <pubDate>Fri, 10 Apr 2026 01:56:22 +0000</pubDate>
  </item>
  <item>
    <title>Advanced CSRF: How to Bypass SameSite Cookie Protections</title>
    <link>https://sajjapremsai.github.io/blogs/2025/06/28/adva-csrf/</link>
    <guid isPermaLink="true">https://sajjapremsai.github.io/blogs/2025/06/28/adva-csrf/</guid>
    <description>Advanced CSRF: How to Bypass SameSite Cookie Protections</description>
    <category>CSRF</category>
    <pubDate>Fri, 10 Apr 2026 01:56:22 +0000</pubDate>
  </item>
  <item>
    <title>CSRF &amp; Bypasses - Cobalt</title>
    <link>https://www.cobalt.io/learning-center/csrf-bypasses</link>
    <guid isPermaLink="true">https://www.cobalt.io/learning-center/csrf-bypasses</guid>
    <description>CSRF &amp; Bypasses - Cobalt</description>
    <category>CSRF</category>
    <pubDate>Fri, 10 Apr 2026 01:56:21 +0000</pubDate>
  </item>
  <item>
    <title>Cross-site request forgery - Wikipedia</title>
    <link>https://en.wikipedia.org/wiki/Cross-site_request_forgery</link>
    <guid isPermaLink="true">https://en.wikipedia.org/wiki/Cross-site_request_forgery</guid>
    <description>Cross-site request forgery - Wikipedia</description>
    <category>CSRF</category>
    <pubDate>Fri, 10 Apr 2026 01:43:55 +0000</pubDate>
  </item>
  <item>
    <title>CSRF - OWASP Foundation</title>
    <link>https://owasp.org/www-community/attacks/csrf</link>
    <guid isPermaLink="true">https://owasp.org/www-community/attacks/csrf</guid>
    <description>CSRF - OWASP Foundation</description>
    <category>CSRF</category>
    <pubDate>Fri, 10 Apr 2026 01:43:54 +0000</pubDate>
  </item>
  <item>
    <title>CSRF: Cross Site Request Forgery Example - Imperva</title>
    <link>https://www.imperva.com/learn/application-security/csrf-cross-site-request-forgery/</link>
    <guid isPermaLink="true">https://www.imperva.com/learn/application-security/csrf-cross-site-request-forgery/</guid>
    <description>CSRF: Cross Site Request Forgery Example - Imperva</description>
    <category>CSRF</category>
    <pubDate>Fri, 10 Apr 2026 01:43:54 +0000</pubDate>
  </item>
  <item>
    <title>CWE-352: Cross-Site Request Forgery</title>
    <link>https://cwe.mitre.org/data/definitions/352.html</link>
    <guid isPermaLink="true">https://cwe.mitre.org/data/definitions/352.html</guid>
    <description>CWE-352: Cross-Site Request Forgery</description>
    <category>CSRF</category>
    <pubDate>Fri, 10 Apr 2026 01:43:53 +0000</pubDate>
  </item>
  <item>
    <title>What Is CSRF? - Palo Alto Networks</title>
    <link>https://www.paloaltonetworks.com/cyberpedia/csrf-cross-site-request-forgery</link>
    <guid isPermaLink="true">https://www.paloaltonetworks.com/cyberpedia/csrf-cross-site-request-forgery</guid>
    <description>What Is CSRF? - Palo Alto Networks</description>
    <category>CSRF</category>
    <pubDate>Fri, 10 Apr 2026 01:43:52 +0000</pubDate>
  </item>
  <item>
    <title>What is CSRF? Attacks, Mitigation, Prevention - Acunetix</title>
    <link>https://www.acunetix.com/websitesecurity/csrf-attacks/</link>
    <guid isPermaLink="true">https://www.acunetix.com/websitesecurity/csrf-attacks/</guid>
    <description>What is CSRF? Attacks, Mitigation, Prevention - Acunetix</description>
    <category>CSRF</category>
    <pubDate>Fri, 10 Apr 2026 01:43:51 +0000</pubDate>
  </item>
  <item>
    <title>CSRF Attacks - Rapid7</title>
    <link>https://www.rapid7.com/fundamentals/cross-site-request-forgery/</link>
    <guid isPermaLink="true">https://www.rapid7.com/fundamentals/cross-site-request-forgery/</guid>
    <description>CSRF Attacks - Rapid7</description>
    <category>CSRF</category>
    <pubDate>Fri, 10 Apr 2026 01:43:51 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-25101: Bludit Authentication Bypass Vulnerability</title>
    <link>https://www.sentinelone.com/vulnerability-database/cve-2026-25101/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/vulnerability-database/cve-2026-25101/</guid>
    <description>CVE-2026-25101: Bludit Authentication Bypass Vulnerability</description>
    <category>CSRF</category>
    <pubDate>Mon, 06 Apr 2026 02:01:20 +0000</pubDate>
  </item>
  <item>
    <title>Cookies: HTTP State Management Mechanism (RFC 6265bis)</title>
    <link>https://httpwg.org/http-extensions/draft-ietf-httpbis-rfc6265bis.html</link>
    <guid isPermaLink="true">https://httpwg.org/http-extensions/draft-ietf-httpbis-rfc6265bis.html</guid>
    <description>Cookies: HTTP State Management Mechanism (RFC 6265bis)</description>
    <category>CSRF</category>
    <pubDate>Mon, 06 Apr 2026 02:01:19 +0000</pubDate>
  </item>
  <item>
    <title>3 Security Failure Modes in Vibe-Coded Apps</title>
    <link>https://aiweekender.substack.com/p/3-security-failure-modes-in-vibe</link>
    <guid isPermaLink="true">https://aiweekender.substack.com/p/3-security-failure-modes-in-vibe</guid>
    <description>3 Security Failure Modes in Vibe-Coded Apps</description>
    <category>CSRF</category>
    <pubDate>Mon, 06 Apr 2026 02:01:18 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-34394: Wwbn Avideo CSRF Vulnerability</title>
    <link>https://www.sentinelone.com/vulnerability-database/cve-2026-34394/</link>
    <guid isPermaLink="true">https://www.sentinelone.com/vulnerability-database/cve-2026-34394/</guid>
    <description>CVE-2026-34394: Wwbn Avideo CSRF Vulnerability</description>
    <category>CSRF</category>
    <pubDate>Mon, 06 Apr 2026 02:01:16 +0000</pubDate>
  </item>
  <item>
    <title>Cross-site request forgery (CSRF) - Security - MDN Web Docs</title>
    <link>https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/CSRF</link>
    <guid isPermaLink="true">https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/CSRF</guid>
    <description>Cross-site request forgery (CSRF) - Security - MDN Web Docs</description>
    <category>CSRF</category>
    <pubDate>Mon, 06 Apr 2026 02:01:15 +0000</pubDate>
  </item>
  <item>
    <title>Diamond award for Bexhill and Hastings community group for retirees</title>
    <link>https://www.msn.com/en-gb/money/other/diamond-award-for-bexhill-and-hastings-community-group-for-retirees/ar-AA1ZiWKK</link>
    <guid isPermaLink="true">https://www.msn.com/en-gb/money/other/diamond-award-for-bexhill-and-hastings-community-group-for-retirees/ar-AA1ZiWKK</guid>
    <description>Diamond award for Bexhill and Hastings community group for retirees https://ift.tt/eER5YBr</description>
    <category>CSRF</category>
    <pubDate>Sat, 04 Apr 2026 19:17:47 +0000</pubDate>
  </item>
  <item>
    <title>CSRF Exploitation Techniques — Flaws, Bypasses &amp; SameSite Cookie Mechanics</title>
    <link>https://medium.com/@agarwaldaksh18/%EF%B8%8F-day-7-csrf-exploitation-techniques-flaws-bypasses-samesite-cookie-mechanics-c6b5999c3d7d</link>
    <guid isPermaLink="true">https://medium.com/@agarwaldaksh18/%EF%B8%8F-day-7-csrf-exploitation-techniques-flaws-bypasses-samesite-cookie-mechanics-c6b5999c3d7d</guid>
    <description>CSRF Exploitation Techniques — Flaws, Bypasses &amp; SameSite Cookie Mechanics</description>
    <category>CSRF</category>
    <pubDate>Fri, 03 Apr 2026 15:57:17 +0000</pubDate>
  </item>
  <item>
    <title>Lab: SameSite Lax Bypass via Cookie Refresh | PortSwigger</title>
    <link>https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions/lab-samesite-strict-bypass-via-cookie-refresh</link>
    <guid isPermaLink="true">https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions/lab-samesite-strict-bypass-via-cookie-refresh</guid>
    <description>Lab: SameSite Lax Bypass via Cookie Refresh | PortSwigger</description>
    <category>CSRF</category>
    <pubDate>Fri, 03 Apr 2026 15:57:15 +0000</pubDate>
  </item>
  <item>
    <title>Lab: SameSite Lax Bypass via Method Override | PortSwigger</title>
    <link>https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions/lab-samesite-lax-bypass-via-method-override</link>
    <guid isPermaLink="true">https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions/lab-samesite-lax-bypass-via-method-override</guid>
    <description>Lab: SameSite Lax Bypass via Method Override | PortSwigger</description>
    <category>CSRF</category>
    <pubDate>Fri, 03 Apr 2026 15:57:14 +0000</pubDate>
  </item>
  <item>
    <title>Advanced Techniques to Bypass CSRF Defenses</title>
    <link>https://medium.com/h7w/cracking-the-code-advanced-techniques-to-bypass-csrf-defenses-139333fb3202</link>
    <guid isPermaLink="true">https://medium.com/h7w/cracking-the-code-advanced-techniques-to-bypass-csrf-defenses-139333fb3202</guid>
    <description>Advanced Techniques to Bypass CSRF Defenses</description>
    <category>CSRF</category>
    <pubDate>Fri, 03 Apr 2026 15:57:12 +0000</pubDate>
  </item>
  <item>
    <title>Cross-Site Request Forgery (CSRF) Attack Guide | Hackviser</title>
    <link>https://hackviser.com/tactics/pentesting/web/csrf</link>
    <guid isPermaLink="true">https://hackviser.com/tactics/pentesting/web/csrf</guid>
    <description>Cross-Site Request Forgery (CSRF) Attack Guide | Hackviser</description>
    <category>CSRF</category>
    <pubDate>Fri, 03 Apr 2026 15:57:11 +0000</pubDate>
  </item>
  <item>
    <title>CSRF (Cross Site Request Forgery) | HackTricks</title>
    <link>https://book.hacktricks.xyz/pentesting-web/csrf-cross-site-request-forgery</link>
    <guid isPermaLink="true">https://book.hacktricks.xyz/pentesting-web/csrf-cross-site-request-forgery</guid>
    <description>CSRF (Cross Site Request Forgery) | HackTricks</description>
    <category>CSRF</category>
    <pubDate>Fri, 03 Apr 2026 15:57:09 +0000</pubDate>
  </item>
  <item>
    <title>Bypassing SameSite Cookie Restrictions - CSRF | PortSwigger</title>
    <link>https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions</link>
    <guid isPermaLink="true">https://portswigger.net/web-security/csrf/bypassing-samesite-restrictions</guid>
    <description>Bypassing SameSite Cookie Restrictions - CSRF | PortSwigger</description>
    <category>CSRF</category>
    <pubDate>Fri, 03 Apr 2026 15:57:08 +0000</pubDate>
  </item>
  <item>
    <title>CSRF &amp; Bypasses | Cobalt</title>
    <link>https://www.cobalt.io/blog/csrf-bypasses</link>
    <guid isPermaLink="true">https://www.cobalt.io/blog/csrf-bypasses</guid>
    <description>CSRF &amp; Bypasses | Cobalt</description>
    <category>CSRF</category>
    <pubDate>Fri, 03 Apr 2026 15:57:07 +0000</pubDate>
  </item>
  <item>
    <title>Cross-Site Request Forgery Prevention Cheat Sheet | OWASP</title>
    <link>https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html</link>
    <guid isPermaLink="true">https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html</guid>
    <description>Cross-Site Request Forgery Prevention Cheat Sheet | OWASP</description>
    <category>CSRF</category>
    <pubDate>Fri, 03 Apr 2026 15:57:05 +0000</pubDate>
  </item>
  <item>
    <title>Diamond award for Bexhill and Hastings community group for retirees</title>
    <link>https://www.msn.com/en-gb/money/other/diamond-award-for-bexhill-and-hastings-community-group-for-retirees/ar-AA1ZiWKK?apiversion</link>
    <guid isPermaLink="true">https://www.msn.com/en-gb/money/other/diamond-award-for-bexhill-and-hastings-community-group-for-retirees/ar-AA1ZiWKK?apiversion</guid>
    <description>Diamond award for Bexhill and Hastings community group for retirees https://ift.tt/GT76kYD</description>
    <category>CSRF</category>
    <pubDate>Thu, 02 Apr 2026 19:57:48 +0000</pubDate>
  </item>
  <item>
    <title>Side-by-Side Comparison of SSRF vs. CSRF | Attaxion</title>
    <link>https://attaxion.com/blog/ssrf-vs-csrf-difference/?utm_content=348759727&amp;utm_medium=social&amp;utm_source=twitter&amp;hss_channel=tw-1684349675367694336</link>
    <guid isPermaLink="true">https://attaxion.com/blog/ssrf-vs-csrf-difference/?utm_content=348759727&amp;utm_medium=social&amp;utm_source=twitter&amp;hss_channel=tw-1684349675367694336</guid>
    <description>This content compares SSRF (Server-Side Request Forgery) and CSRF (Cross-Site Request Forgery) vulnerabilities, highlighting their distinctions in targets, impact, and mitigation strategies. It aims to provide a clear understanding of the variances between these two types of security risks.</description>
    <category>CSRF</category>
    <pubDate>Thu, 25 Sep 2025 02:49:55 +0000</pubDate>
  </item>
  <item>
    <title>devanshbatham/Vulnerabilities-Unmasked</title>
    <link>https://github.com/devanshbatham/Vulnerabilities-Unmasked</link>
    <guid isPermaLink="true">https://github.com/devanshbatham/Vulnerabilities-Unmasked</guid>
    <description>The content provided is a GitHub repository named &quot;Vulnerabilities-Unmasked&quot; created by devanshbatham. The repository likely contains information related to vulnerabilities in software or systems that have been exposed or revealed. It appears to be a collection of security vulnerabilities that have been identified and documented. The content is brief and does not provide specific details about the vulnerabilities or their nature.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:39 +0000</pubDate>
  </item>
  <item>
    <title>In Praise of CSRF Tokens – Tim MalcomVetter – Medium</title>
    <link>https://medium.com/@malcomvetter/in-praise-of-csrf-tokens-9ff556ac2ea0</link>
    <guid isPermaLink="true">https://medium.com/@malcomvetter/in-praise-of-csrf-tokens-9ff556ac2ea0</guid>
    <description>The content titled &quot;In Praise of CSRF Tokens&quot; by Tim MalcomVetter on Medium likely discusses the importance and benefits of Cross-Site Request Forgery (CSRF) tokens in web security. CSRF tokens are used to prevent unauthorized actions on websites by verifying the origin of requests. The article may highlight how CSRF tokens enhance security measures and protect against malicious attacks. It likely emphasizes the significance of implementing CSRF tokens to safeguard user data and maintain the integrity of web applications.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:37 +0000</pubDate>
  </item>
  <item>
    <title>Facebook GraphQL CSRF – These aren&#x27;t the access_tokens you&#x27;re looking for</title>
    <link>https://philippeharewood.com/facebook-graphql-csrf/</link>
    <guid isPermaLink="true">https://philippeharewood.com/facebook-graphql-csrf/</guid>
    <description>The content seems to highlight a potential security issue related to Facebook&#x27;s GraphQL service, specifically concerning Cross-Site Request Forgery (CSRF) attacks. It suggests that access tokens may not be the main target for such attacks. This implies that there may be vulnerabilities in the handling of GraphQL requests that could be exploited by malicious actors. It serves as a cautionary note for users and developers to be aware of potential CSRF risks when using Facebook&#x27;s GraphQL service.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:33 +0000</pubDate>
  </item>
  <item>
    <title>https://medium.com/@jrozner/wiping-out-csrf-ded97ae7e83f</title>
    <link>https://medium.com/@jrozner/wiping-out-csrf-ded97ae7e83f</link>
    <guid isPermaLink="true">https://medium.com/@jrozner/wiping-out-csrf-ded97ae7e83f</guid>
    <description>The content discusses Cross-Site Request Forgery (CSRF) attacks and the importance of implementing secure practices to prevent them. It highlights the risks associated with CSRF attacks, such as unauthorized actions on behalf of users. The author emphasizes the significance of using anti-CSRF tokens and secure coding practices to mitigate these risks. By incorporating these measures, websites can enhance their security and protect users from CSRF vulnerabilities.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:29 +0000</pubDate>
  </item>
  <item>
    <title>https://www.purehacking.com/blog/andre-onofre-lima/bypassing-csrf-tokens-with-pythons-cgihttpserver</title>
    <link>https://www.purehacking.com/blog/andre-onofre-lima/bypassing-csrf-tokens-with-pythons-cgihttpserver</link>
    <guid isPermaLink="true">https://www.purehacking.com/blog/andre-onofre-lima/bypassing-csrf-tokens-with-pythons-cgihttpserver</guid>
    <description>The content discusses bypassing CSRF tokens using Python&#x27;s CGIHTTPServer. It explains how to exploit a vulnerability in web applications by using Python scripts to bypass CSRF protection mechanisms. The method involves setting up a local server to receive and process malicious requests, allowing attackers to manipulate user sessions. By understanding this technique, developers can strengthen their defenses against CSRF attacks.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:25 +0000</pubDate>
  </item>
  <item>
    <title>web application - Should login and logout action have CSRF protection? - In</title>
    <link>https://security.stackexchange.com/questions/62769/should-login-and-logout-action-have-csrf-protection</link>
    <guid isPermaLink="true">https://security.stackexchange.com/questions/62769/should-login-and-logout-action-have-csrf-protection</guid>
    <description>The content discusses whether login and logout actions in a web application should have Cross-Site Request Forgery (CSRF) protection. CSRF protection is important for login actions to prevent unauthorized access by malicious websites. However, it may not be necessary for logout actions as they typically do not involve sensitive data. Implementing CSRF protection for both actions can enhance security, but the level of protection needed should be based on the specific risks and requirements of the web application.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:21 +0000</pubDate>
  </item>
  <item>
    <title>https://mixmax.com/blog/modern-csrf</title>
    <link>https://mixmax.com/blog/modern-csrf</link>
    <guid isPermaLink="true">https://mixmax.com/blog/modern-csrf</guid>
    <description>The content discusses modern Cross-Site Request Forgery (CSRF) attacks and how they can be prevented. It highlights the importance of protecting against CSRF vulnerabilities by implementing secure coding practices and utilizing tools like SameSite cookies and CSRF tokens. The article emphasizes the significance of understanding the evolving nature of CSRF attacks and staying updated on best practices to safeguard web applications. It provides insights into the impact of CSRF attacks on user data security and suggests proactive measures to mitigate these risks effectively.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:19 +0000</pubDate>
  </item>
  <item>
    <title>https://scotthelme.co.uk/csrf-is-dead/</title>
    <link>https://scotthelme.co.uk/csrf-is-dead/</link>
    <guid isPermaLink="true">https://scotthelme.co.uk/csrf-is-dead/</guid>
    <description>The content discusses the CSRF (Cross-Site Request Forgery) vulnerability and its decreasing relevance due to modern web security practices. It highlights the importance of SameSite cookies, Content Security Policy (CSP), and other security measures in mitigating CSRF attacks. The author emphasizes the need for developers to adopt these security measures to protect against CSRF vulnerabilities effectively. Overall, the article suggests that with the implementation of proper security measures, CSRF attacks are becoming less prevalent and less effective in compromising web applications.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:17 +0000</pubDate>
  </item>
  <item>
    <title>oauth 2.0 - How does CSRF work without state parameter in OAuth2.0? - Stack</title>
    <link>http://stackoverflow.com/questions/35985551/how-does-csrf-work-without-state-parameter-in-oauth2-0</link>
    <guid isPermaLink="true">http://stackoverflow.com/questions/35985551/how-does-csrf-work-without-state-parameter-in-oauth2-0</guid>
    <description>The content discusses the concept of Cross-Site Request Forgery (CSRF) in OAuth 2.0 and how it operates without the state parameter. CSRF attacks can occur when a malicious website tricks a user&#x27;s browser into making unauthorized requests to a different site where the user is authenticated. The absence of the state parameter in OAuth 2.0 can make it vulnerable to CSRF attacks, potentially compromising user security. It is important to implement proper security measures to prevent CSRF attacks in OAuth 2.0 implementations.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:15 +0000</pubDate>
  </item>
  <item>
    <title>Paypal bug bounty: Updating the Paypal.me profile picture without consent (</title>
    <link>https://hethical.io/paypal-bug-bounty-updating-the-paypal-me-profile-picture-without-consent-csrf-attack/</link>
    <guid isPermaLink="true">https://hethical.io/paypal-bug-bounty-updating-the-paypal-me-profile-picture-without-consent-csrf-attack/</guid>
    <description>The content likely discusses a bug bounty program related to Paypal.me, focusing on a specific issue where a profile picture can be updated without the user&#x27;s consent. This type of vulnerability could potentially lead to privacy concerns and unauthorized changes to user profiles. It highlights the importance of identifying and fixing such bugs to ensure the security and privacy of users on the platform.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:13 +0000</pubDate>
  </item>
  <item>
    <title>WordPress Front End Security: CSRF and Nonces | CSS-Tricks</title>
    <link>https://css-tricks.com/wordpress-front-end-security-csrf-and-nonces/</link>
    <guid isPermaLink="true">https://css-tricks.com/wordpress-front-end-security-csrf-and-nonces/</guid>
    <description>The content titled &quot;WordPress Front End Security: CSRF and Nonces&quot; on CSS-Tricks likely discusses security measures related to Cross-Site Request Forgery (CSRF) and Nonces in WordPress websites. CSRF protection helps prevent unauthorized actions, while Nonces are security tokens used to verify the origin of requests. The article may delve into how these security features are implemented in WordPress to safeguard against malicious attacks on the front end of websites.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:11 +0000</pubDate>
  </item>
  <item>
    <title>ruby - Sinatra CSRF Authenticity tokens - Stack Overflow</title>
    <link>http://stackoverflow.com/questions/11451161/sinatra-csrf-authenticity-tokens</link>
    <guid isPermaLink="true">http://stackoverflow.com/questions/11451161/sinatra-csrf-authenticity-tokens</guid>
    <description>The content is about using CSRF (Cross-Site Request Forgery) authenticity tokens in a Ruby web application built with Sinatra. This security measure helps prevent unauthorized actions by verifying the origin of requests. The discussion likely involves implementing CSRF protection in Sinatra applications to enhance security and protect against malicious attacks. The content seems to be a question or discussion thread related to this topic on the Stack Overflow platform.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:09 +0000</pubDate>
  </item>
  <item>
    <title>Avoiding CSRF Attacks with API Design</title>
    <link>http://www.thedreaming.org/2020/05/26/avoid-csrf-attacks-with-api-design/</link>
    <guid isPermaLink="true">http://www.thedreaming.org/2020/05/26/avoid-csrf-attacks-with-api-design/</guid>
    <description>The content is about preventing Cross-Site Request Forgery (CSRF) attacks through effective API design. CSRF attacks exploit the trust a website has in a user&#x27;s browser to perform unauthorized actions. By designing APIs with security in mind, developers can implement measures to prevent CSRF attacks, such as using tokens or headers to validate requests. Proper API design can help protect against CSRF vulnerabilities and ensure the security of web applications.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:06 +0000</pubDate>
  </item>
  <item>
    <title>Samesite by Default and What It Means for Bug Bounty Hunters</title>
    <link>https://blog.reconless.com/samesite-by-default/</link>
    <guid isPermaLink="true">https://blog.reconless.com/samesite-by-default/</guid>
    <description>The content seems to discuss the impact of the &quot;SameSite by Default&quot; attribute on bug bounty hunters. This attribute is a security feature that restricts cookies to first-party contexts by default, enhancing user privacy and security. Bug bounty hunters may need to adapt their testing strategies to account for this change, as it affects how they can discover and report vulnerabilities related to cookies. Understanding the implications of SameSite by Default is crucial for bug bounty hunters to effectively identify and address security issues in web applications.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:04 +0000</pubDate>
  </item>
  <item>
    <title>Bypass SameSite Cookies Default to Lax and get CSRF</title>
    <link>https://medium.com/@renwa/bypass-samesite-cookies-default-to-lax-and-get-csrf-343ba09b9f2b</link>
    <guid isPermaLink="true">https://medium.com/@renwa/bypass-samesite-cookies-default-to-lax-and-get-csrf-343ba09b9f2b</guid>
    <description>The content highlights a security vulnerability where bypassing SameSite cookies set to the default &quot;Lax&quot; mode can lead to Cross-Site Request Forgery (CSRF) attacks. This vulnerability allows malicious actors to exploit the lax SameSite cookie setting to perform unauthorized actions on behalf of a user. It emphasizes the importance of properly configuring SameSite cookie settings to prevent CSRF attacks and ensure the security of web applications.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:02 +0000</pubDate>
  </item>
  <item>
    <title>https://link.medium.com/fsUnTVniS0</title>
    <link>https://link.medium.com/fsUnTVniS0</link>
    <guid isPermaLink="true">https://link.medium.com/fsUnTVniS0</guid>
    <description>I&#x27;m sorry, but I am unable to access external content such as the Medium link you provided. If you could provide a brief overview or key points from the content, I would be happy to help summarize it for you in 100 words or less.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:26:00 +0000</pubDate>
  </item>
  <item>
    <title>https://link.medium.com/eRtuh4nQVZ</title>
    <link>https://link.medium.com/eRtuh4nQVZ</link>
    <guid isPermaLink="true">https://link.medium.com/eRtuh4nQVZ</guid>
    <description>I&#x27;m unable to access external content to provide a summary. If you could provide the main points or key ideas from the content, I&#x27;d be happy to help summarize it for you.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:25:58 +0000</pubDate>
  </item>
  <item>
    <title>https://link.medium.com/FPn7EsRFvZ</title>
    <link>https://link.medium.com/FPn7EsRFvZ</link>
    <guid isPermaLink="true">https://link.medium.com/FPn7EsRFvZ</guid>
    <description>I&#x27;m unable to access external content. If you provide me with the key points or a brief summary of the content, I&#x27;d be happy to help summarize it for you.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:25:56 +0000</pubDate>
  </item>
  <item>
    <title>https://link.medium.com/d496ONHsdZ</title>
    <link>https://link.medium.com/d496ONHsdZ</link>
    <guid isPermaLink="true">https://link.medium.com/d496ONHsdZ</guid>
    <description>I&#x27;m sorry, but I am unable to access external content such as the Medium link provided. If you can provide a brief overview or key points from the content, I&#x27;d be happy to help summarize it for you within 100 words or less.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:25:54 +0000</pubDate>
  </item>
  <item>
    <title>https://medium.com/@shub66452/account-takeover-using-csrf-json-based-a0e6efd1bffc</title>
    <link>https://medium.com/@shub66452/account-takeover-using-csrf-json-based-a0e6efd1bffc</link>
    <guid isPermaLink="true">https://medium.com/@shub66452/account-takeover-using-csrf-json-based-a0e6efd1bffc</guid>
    <description>The article discusses a security vulnerability known as Cross-Site Request Forgery (CSRF) that can lead to an account takeover when combined with JSON-based attacks. It explains how CSRF works, the impact it can have on user accounts, and how attackers can exploit it to gain unauthorized access. The author provides a detailed explanation of the attack scenario and suggests preventive measures to protect against CSRF and JSON-based attacks. Overall, the article highlights the importance of understanding and mitigating these security risks to safeguard user accounts and sensitive data.</description>
    <category>CSRF</category>
    <pubDate>Thu, 14 Aug 2025 04:25:52 +0000</pubDate>
  </item>
</channel>
</rss>