Insecure cookies lack proper security flags, making them vulnerable to theft via XSS, interception over HTTP, or cross-site request forgery.
Scan for This VulnerabilityCookies store sensitive session data. Without proper flags, they can be stolen through JavaScript (if HttpOnly is missing), intercepted over HTTP (if Secure is missing), or exploited in CSRF attacks (if SameSite is missing). These flags are your last line of defense for session security.
Session hijacking through XSS attacks
Cookie interception on non-HTTPS connections
Cross-site request forgery (CSRF) attacks
Account takeover through stolen sessions
Prevents JavaScript from accessing the cookie, protecting against XSS.
// Cookie should have:
Set-Cookie: session=abc123; HttpOnlyCookie only sent over HTTPS connections.
Set-Cookie: session=abc123; SecureProtects against CSRF attacks.
Set-Cookie: session=abc123; SameSite=Lax
// or SameSite=Strict for maximum protectionAll security flags combined.
Set-Cookie: session=abc123; HttpOnly; Secure; SameSite=Lax; Path=/VAS automatically scans for insecure cookie configuration and provides detailed remediation guidance.
Run Security Scan