Configuring Spring Security to defend against CSRF

Cross-Site Request Forgery (CSRF) attacks are a prevalent form of web vulnerability that can lead to unauthorized actions being performed on behalf of a user. These attacks occur when a malicious website tricks a user's browser into making a request to another site where the user is authenticated. To protect against CSRF attacks, it is essential to configure Spring Security properly. In this article, we will explore how to do just that.

Understanding CSRF attacks

Before diving into the steps to configure Spring Security to defend against CSRF attacks, let's have a brief understanding of how these attacks work. A typical CSRF attack involves the following steps:

  1. The user authenticates into a legitimate website A.
  2. While the user is still authenticated, they visit a malicious website B.
  3. The malicious website B contains a hidden form or JavaScript code that makes a forged request to the legitimate website A.
  4. The user's browser, unknowingly, executes the forged request, and if vulnerable, the legitimate website A processes it as an authenticated action, leading to unauthorized actions.

To prevent CSRF attacks, Spring Security provides built-in protection by generating a random token (known as CSRF token) and associating it with user sessions.

Configuring Spring Security for CSRF protection

To configure Spring Security to defend against CSRF attacks, follow these steps:

  1. Include the required dependencies: Make sure your project includes the necessary Spring Security dependencies. For example, using Maven, add the following dependency to your project's pom.xml file: xml <dependency> <groupId>org.springframework.boot</groupId> <artifactId>spring-boot-starter-security</artifactId> </dependency>

  2. Enable CSRF protection in Spring Security: In your Spring Security configuration file (typically, enable CSRF protection by adding the @EnableWebSecurity annotation and overriding the configure(HttpSecurity http) method. Include the following code snippet: ```java @EnableWebSecurity public class SecurityConfig extends WebSecurityConfigurerAdapter {

    @Override protected void configure(HttpSecurity http) throws Exception { http .csrf() .csrfTokenRepository(CookieCsrfTokenRepository.withHttpOnlyFalse()); } } ```

The CookieCsrfTokenRepository.withHttpOnlyFalse() ensures that the CSRF token is stored in a cookie and sent as a header with each request.

  1. Update your forms: To include the CSRF token in forms, modify your HTML forms to include the following input field: html <input type="hidden" name="${_csrf.parameterName}" value="${_csrf.token}"/>

  2. Test your protected application: After configuring Spring Security to defend against CSRF attacks, thoroughly test your application to ensure the CSRF protection works as expected.

By following these steps, you can effectively configure Spring Security to defend against CSRF attacks and protect your application from unauthorized actions.


Protecting your web application from CSRF attacks is of utmost importance to maintain the security and integrity of user actions. By properly configuring Spring Security and following best practices, you can minimize the risk of CSRF vulnerabilities in your application.

© NoobToMaster - A 10xcoder company