Unrestricted CORS configuration enables cross-origin attacks
criticalsecurityUpdated Dec 17, 2025(via Exa)
Technologies:
How to detect:
ALLOWED_ORIGINS set to wildcard (*) permits any origin to access monitoring API, enabling CSRF attacks and unauthorized data access.
Recommended action:
Restrict ALLOWED_ORIGINS to specific known domains only. Never use wildcard (*) in production. Example: ALLOWED_ORIGINS=https://kanchi.yourcompany.com,https://ops.internal. Configure ALLOWED_HOSTS to restrict hostname access. Test CORS configuration before deployment.