Cookie Poisoning
- Risk:
Informational
- Type:
- Passive
- CWE:
- CWE-565
- Summary
This check looks at user-supplied input in query string parameters and POST data to identify where cookie parameters might be controlled. This is called a cookie poisoning attack, and becomes exploitable when an attacker can manipulate the cookie in various ways. In some cases this will not be exploitable, however, allowing URL parameters to set cookie values is generally considered a bug.
- Solution
Do not allow user input to control cookie names and values. If some query string parameters must be set in cookie values, be sure to filter out semicolon's that can serve as name/value pair delimiters.
- Other info
- An attacker may be able to poison cookie values through URL parameters. Try injecting a semicolon to see if you can add cookie values (e.g. name=controlledValue;name=anotherValue;). This was identified at: https://example.com/transact User-input was found in the following cookie: value=poison; SameSite=Strict The user input was: place=poison
TP-Link warns of critical command injection flaw in Omada gateways
CISA confirms hackers exploited Oracle E-Business Suite SSRF flaw
Cursor, Windsurf IDEs riddled with 94+ n-day Chromium vulnerabilities
Hackers exploit 34 zero-days on first day of Pwn2Own Ireland
Microsoft: Recent Windows updates cause login issues on some PCs
Russian hackers evolve malware pushed in "I am not a robot" captchas
Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams
PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign
Microsoft fixes bug preventing users from opening classic Outlook
CVE-2025-61884 Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability
CVE-2025-33073 Microsoft Windows SMB Client Improper Access Control Vulnerability
CVE-2022-48503 Apple Multiple Products Unspecified Vulnerability
CVE-2025-54253 Adobe Experience Manager Forms Code Execution Vulnerability
CVE-2016-7836 SKYSEA Client View Improper Authentication Vulnerability
CVE-2025-6264 Rapid7 Velociraptor Incorrect Default Permissions Vulnerability
CVE-2025-59230 Microsoft Windows Improper Access Control Vulnerability
CVE-2025-24990 Microsoft Windows Untrusted Pointer Dereference Vulnerability
InformationalGraphQL Endpoint Supports Introspection
MediumAnti-CSRF Tokens Check
InformationalServer Leaks its Webserver Application via "Server" HTTP Response Header Field
InformationalBase64 Disclosure
MediumBackup File Disclosure
Free online web security scanner