Client-Side Security
Client-Side Security vulnerabilities at a glance
Overview
Client-side security vulnerabilities exploit the trust relationship between users and web applications. These attacks execute in the victim's browser context, allowing attackers to steal sensitive data, perform unauthorized actions, manipulate the user interface, or bypass security boundaries.
There are different types of vulnerabilities that modern web applications must defend against such as: Cross-Site Scripting (XSS), Clickjacking, Open Redirects, and CORS. Proper client-side security requires input sanitization, output encoding, security headers, and strict origin policies.
Where it occurs
Client-side vulnerabilities occur in browser-executed code that mishandles untrusted input, lacks CSRF protections, or allows unsafe framing and redirects.
Impact
Client-side vulnerabilities can lead to session hijacking and account takeover, credential theft through keylogging or form manipulation, and unauthorized actions performed on behalf of users.
Prevention
Sanitize and encode user input appropriately, enforce a strict Content Security Policy, and use anti-CSRF tokens for all state-changing actions.
Specific Vulnerabilities
Explore specific vulnerability types within this category:
Detect These Vulnerabilities in Your Code
Sourcery automatically identifies client-side security and related vulnerabilities in your codebase.
Scan Your Code for Free