Summary

Acunetix 360 detected that one of following CSP directives is used:

  • unsafe-eval
  • unsafe-inline

By using unsafe-eval, you allow the use of string evaluation functions like eval.

By using unsafe-inline, you allow the execution of inline scripts, which almost defeats the purpose of CSP. When this is allowed, it's very easy to successfully exploit a Cross-site Scripting vulnerability on your website.

Impact

An attacker can bypass CSP and exploit a Cross-site Scripting vulnerability successfully.

Remediation

If possible remove unsafe-eval and unsafe-inline from your CSP directives.

Severity

Information

Classification

CWE-16 ISO27001-A.14.2.5 WASC-15