Missing X-Frame-Options Header in HTTP Responses
Express applications don't set X-Frame-Options header in HTTP responses, allowing any website to embed the application in iframes. Default Express configuration doesn't include security headers - developers must explicitly add them. Applications render sensitive pages (login forms, payment pages, account settings) without frame protection. No global middleware configuring security headers means each route must individually set headers or they're omitted. Developers unfamiliar with clickjacking attacks don't recognize need for frame protection. Testing focuses on functionality not security headers. Penetration tests or security scans eventually discover missing X-Frame-Options but vulnerability persists until identified.