Skip to content

Commit 8dd3b11

Browse files
ErykKulCopilot
andauthored
Potential fix for pull request finding
Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com>
1 parent dd1e1c7 commit 8dd3b11

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

doc/release-notes/12178-session-cookie-api-hardening.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ When hardening is enabled, every API request authenticated via session cookie mu
55
- A valid same-origin `Origin` or `Referer` header.
66
- The `X-Dataverse-CSRF-Token` header matching the token from `GET /api/users/:csrf-token`.
77

8-
This applies uniformly to all HTTP methods and all API paths, with no exceptions. Clients not on the same origin should use bearer-token authentication instead.
8+
This applies uniformly to all HTTP methods and all API paths, except for the CSRF bootstrap endpoint (`GET /api/users/:csrf-token`), which is intentionally callable without an existing `X-Dataverse-CSRF-Token` header so clients can obtain the initial token. All subsequent session-cookie-authenticated requests must include the header. Clients not on the same origin should use bearer-token authentication instead.
99

1010
Additional changes:
1111

0 commit comments

Comments
 (0)