Get Started
- CodeAnt AI
- Setup
- Control Center
- Pull Request Review
- IDE
- Compliance
- Anti-Patterns
- Code Governance
- Infrastructure Security Database
- Application Security Database
- Apex
- Bash
- C
- Clojure
- Cpp
- Csharp
- Dockerfile
- Elixir
- Lang
- Phoenix
- Security
- Action-reuse-csrf
- Cross-site-websocket-hijacking
- Hardcoded-secrets
- Hsts-not-enabled
- Https-not-enabled
- Missing-csp
- Missing-csrf-protections
- Missing-secure-browser-headers
- Fingerprints
- Generic
- Go
- Html
- Java
- Javascript
- Json
- Kotlin
- Ocaml
- Php
- Problem-based-packs
- Python
- Ruby
- Rust
- Scala
- Solidity
- Swift
- Terraform
- Typescript
- Yaml
Action-reuse-csrf
Action reuse csrf
The app is most likely vulnerable to CSRF attacks through the reuse of the same action for both GET and POST
Likelihood: MEDIUM
Confidence: LOW
CWE:
- CWE-352: Cross-Site Request Forgery (CSRF)
OWASP:
- A01:2021 - Broken Access Control