SiteShadow
Back to vulnerability library

CWE-614 Insecure Cookie in HTTPS Session

What this means

SiteShadow flagged session cookies that are missing secure attributes (like Secure, HttpOnly, and a safe SameSite) even though the session is used over HTTPS.

Why it matters

Safer examples

1) Set Secure, HttpOnly, and SameSite

res.cookie("session", token, {
  httpOnly: true,
  secure: true,
  sameSite: "lax",
});

2) Rotate sessions on login and privilege changes

If a session is stolen, rotation reduces the window and prevents fixation.

3) Prefer short sessions + revocation

Give users/admins the ability to revoke sessions, and use reasonable expirations (see TOK01).

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage