Celery

Unrestricted CORS configuration enables cross-origin attacks

critical
securityUpdated Dec 17, 2025(via Exa)
Technologies:
How to detect:

ALLOWED_ORIGINS set to wildcard (*) permits any origin to access monitoring API, enabling CSRF attacks and unauthorized data access.

Recommended action:

Restrict ALLOWED_ORIGINS to specific known domains only. Never use wildcard (*) in production. Example: ALLOWED_ORIGINS=https://kanchi.yourcompany.com,https://ops.internal. Configure ALLOWED_HOSTS to restrict hostname access. Test CORS configuration before deployment.