🌐 The CORS configuration chaos

Security misconfiguration

A customer forwards you a concerning email from their IT security team about suspicious network activity.

The email shows their employee visited a seemingly innocent industry blog, but afterwards their browser made dozens of API calls to your platform.

You investigate and discover the blog contains hidden JavaScript that exploits your API's CORS settings.

Any website can now make authenticated requests to your API using visitors' session cookies, accessing their private project data without permission.

Technical Issue: Your API's CORS configuration is set to 'Access-Control-Allow-Origin: *', allowing any website to make authenticated requests to your API. Malicious sites can steal user data by making API calls from visitors' browsers using their existing session cookies.

What's your immediate first move?

← Select different scenario