Skip to content

Headless API documentation potentially incorrect? (otherwise, might lead to a CSRF vulnerabilty?) #4134

Answered by pennersr
luisvalerio asked this question in Q&A
Discussion options

You must be logged in to vote

The app endpoints don't rely on cookies. As a result, a CSRF attack wouldn't work.

Indeed, the documentation shows an example payload there that is not correct. The tokens are only exposed once -- when they are actually issued -- and not repeatedly for each and every other request.

Replies: 1 comment 1 reply

Comment options

You must be logged in to vote
1 reply
@luisvalerio
Comment options

Answer selected by luisvalerio
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants