Insecure Access-Control-Allow-Origin detected.
- Source: insecure_allow_origin.yml
Do not use unverified user-defined input to define Access-Control-Allow-Origin. This can lead to unintended user access to sensitive data.
❌ Avoid defining origins with user input wherever possible.
✅ If unavoidable, be sure to verify the input or to use a safe-list.
OWASP Top 10
To skip this rule during a scan, use the following flag
To run only this rule during a scan, use the following flag
Ready to take the next step? Learn more about Bearer Cloud.