Loading vulnerability page...
CSRF Browser Walkthrough
Watch the browser log into a trusted site, store the session cookie, then reuse that cookie when a different tab triggers a hidden request.
Trusted Account Portal
The user signs in normally, and the browser receives a session cookie.
Malicious page in another tab
It looks unrelated, but it tries to send a hidden request back to the trusted site.
Claim RewardProcessed as if you made it
The action now shows the money being pulled from the bank, processed by the trusted server, and sent to the attacker as if the user had requested it.
Quick understanding
Real tips to avoid this
CSRF happens when an application trusts the browser’s existing session but does not verify that the user truly intended the sensitive action.
If sensitive endpoints rely only on the presence of a session cookie, the browser may send that cookie automatically during a forged cross-site request.
Use anti-CSRF tokens, SameSite cookies, re-authentication for important actions, and explicit confirmation flows.
Unexpected profile changes, unexplained transfers or settings updates, and important actions that succeed without extra confirmation can be signs of weak request validation.