VYPR
High severityNVD Advisory· Published Apr 4, 2023· Updated Feb 10, 2025

SvelteKit has Insufficient Cross-Site Request Forgery Protection

CVE-2023-29003

Description

SvelteKit is a web development framework. The SvelteKit framework offers developers an option to create simple REST APIs. This is done by defining a +server.js file, containing endpoint handlers for different HTTP methods.

SvelteKit provides out-of-the-box cross-site request forgery (CSRF) protection to its users. While the implementation does a sufficient job in mitigating common CSRF attacks, prior to version 1.15.1, the protection can be bypassed by simply specifying a different Content-Type header value.

If abused, this issue will allow malicious requests to be submitted from third-party domains, which can allow execution of operations within the context of the victim's session, and in extreme scenarios can lead to unauthorized access to users’ accounts.

SvelteKit 1.15.1 updates the is_form_content_type function call in the CSRF protection logic to include text/plain. As additional hardening of the CSRF protection mechanism against potential method overrides, SvelteKit 1.15.1 is now performing validation on PUT, PATCH and DELETE methods as well. This latter hardening is only needed to protect users who have put in some sort of ?_method= override feature themselves in their handle hook, so that the request that resolve sees could be PUT/PATCH/DELETE when the browser issues a POST request.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
@sveltejs/kitnpm
< 1.15.11.15.1

Affected products

1

Patches

1
bb2253d51d00

Merge pull request from GHSA-5p75-vc5g-8rv2

https://github.com/sveltejs/kitBen McCannApr 4, 2023via ghsa
5 files changed · +42 15
  • .changeset/cool-lies-fly.md+5 0 added
    @@ -0,0 +1,5 @@
    +---
    +'@sveltejs/kit': patch
    +---
    +
    +fix: address security advisory CVE-2023-29003 by including `text/plain` and `PUT`/`PATCH`/`DELETE` requests in set of blocked cross-origin requests for CSRF protection
    
  • packages/kit/src/runtime/server/respond.js+6 3 modified
    @@ -51,9 +51,12 @@ export async function respond(request, options, manifest, state) {
     
     	if (options.csrf_check_origin) {
     		const forbidden =
    -			request.method === 'POST' &&
    -			request.headers.get('origin') !== url.origin &&
    -			is_form_content_type(request);
    +			is_form_content_type(request) &&
    +			(request.method === 'POST' ||
    +				request.method === 'PUT' ||
    +				request.method === 'PATCH' ||
    +				request.method === 'DELETE') &&
    +			request.headers.get('origin') !== url.origin;
     
     		if (forbidden) {
     			const csrf_error = error(403, `Cross-site ${request.method} form submissions are forbidden`);
    
  • packages/kit/src/utils/http.js+8 1 modified
    @@ -68,5 +68,12 @@ export function is_content_type(request, ...types) {
      * @param {Request} request
      */
     export function is_form_content_type(request) {
    -	return is_content_type(request, 'application/x-www-form-urlencoded', 'multipart/form-data');
    +	// These content types must be protected against CSRF
    +	// https://developer.mozilla.org/en-US/docs/Web/API/HTMLFormElement/enctype
    +	return is_content_type(
    +		request,
    +		'application/x-www-form-urlencoded',
    +		'multipart/form-data',
    +		'text/plain'
    +	);
     }
    
  • packages/kit/test/apps/basics/test/server.test.js+20 8 modified
    @@ -58,15 +58,27 @@ test.describe('Cookies', () => {
     
     test.describe('CSRF', () => {
     	test('Blocks requests with incorrect origin', async ({ baseURL }) => {
    -		const res = await fetch(`${baseURL}/csrf`, {
    -			method: 'POST',
    -			headers: {
    -				'content-type': 'application/x-www-form-urlencoded'
    +		const content_types = [
    +			'application/x-www-form-urlencoded',
    +			'multipart/form-data',
    +			'text/plain'
    +		];
    +		const methods = ['POST', 'PUT', 'PATCH', 'DELETE'];
    +		for (const method of methods) {
    +			for (const content_type of content_types) {
    +				const res = await fetch(`${baseURL}/csrf`, {
    +					method,
    +					headers: {
    +						'content-type': content_type
    +					}
    +				});
    +				const message = `request method: ${method}, content-type: ${content_type}`;
    +				expect(res.status, message).toBe(403);
    +				expect(await res.text(), message).toBe(
    +					`Cross-site ${method} form submissions are forbidden`
    +				);
     			}
    -		});
    -
    -		expect(res.status).toBe(403);
    -		expect(await res.text()).toBe('Cross-site POST form submissions are forbidden');
    +		}
     	});
     });
     
    
  • packages/kit/types/index.d.ts+3 3 modified
    @@ -328,13 +328,13 @@ export interface KitConfig {
     		reportOnly?: CspDirectives;
     	};
     	/**
    -	 * Protection against [cross-site request forgery](https://owasp.org/www-community/attacks/csrf) attacks.
    +	 * Protection against [cross-site request forgery (CSRF)](https://owasp.org/www-community/attacks/csrf) attacks.
     	 */
     	csrf?: {
     		/**
    -		 * Whether to check the incoming `origin` header for `POST` form submissions and verify that it matches the server's origin.
    +		 * Whether to check the incoming `origin` header for `POST`, `PUT`, `PATCH`, or `DELETE` form submissions and verify that it matches the server's origin.
     		 *
    -		 * To allow people to make `POST` form submissions to your app from other origins, you will need to disable this option. Be careful!
    +		 * To allow people to make `POST`, `PUT`, `PATCH`, or `DELETE` requests with a `Content-Type` of `application/x-www-form-urlencoded`, `multipart/form-data`, or `text/plain` to your app from other origins, you will need to disable this option. Be careful!
     		 * @default true
     		 */
     		checkOrigin?: boolean;
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

5

News mentions

0

No linked articles in our index yet.