<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Remove deprecated X-XSS-Protection header from the nginx config]]></title><description><![CDATA[<p dir="auto">Cloudron currently sets <code>X-XSS-Protection: 1; mode=block;</code> (<a href="https://git.cloudron.io/platform/box/-/blob/master/src/nginxconfig.ejs#L110" target="_blank" rel="noopener noreferrer nofollow ugc">https://git.cloudron.io/platform/box/-/blob/master/src/nginxconfig.ejs#L110</a>)</p>
<p dir="auto"><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection" target="_blank" rel="noopener noreferrer nofollow ugc">Mozilla's MDN documentation</a> explicitly warns that "in some cases, X-XSS-Protection can create XSS vulnerabilities in otherwise safe websites" and advises to "avoid using it." <a href="https://http.dev/x-xss-protection" target="_blank" rel="noopener noreferrer nofollow ugc">Chrome removed the feature, and Firefox never implemented it.</a> Only Internet Explorer fully supported it, and I think we're all glad that IE is not a thing anymore.</p>
<p dir="auto">If I understand it correctly, the recommended approach is to either remove the <code>X-XSS-Protection</code> header entirely or explicitly set it to <code>X-XSS-Protection: 0</code> to disable the legacy XSS filter in older browsers that might still honor it, then rely on properly configured CSP headers for actual protection.</p>
<p dir="auto">Given that Cloudron supports CSP, I think there's no justification for keeping a deprecated header that introduces more risk than protection.</p>
]]></description><link>https://forum.cloudron.io/topic/15370/remove-deprecated-x-xss-protection-header-from-the-nginx-config</link><generator>RSS for Node</generator><lastBuildDate>Fri, 10 Apr 2026 16:38:07 GMT</lastBuildDate><atom:link href="https://forum.cloudron.io/topic/15370.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 10 Apr 2026 11:22:50 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Remove deprecated X-XSS-Protection header from the nginx config on Fri, 10 Apr 2026 14:49:55 GMT]]></title><description><![CDATA[<p dir="auto">I would absolutely advocate for re-adding <code>X-Content-Type-Options: nosniff</code> as long as we don't have a way to set headers directly in the Security Settings of Cloudron Apps (like we can with CSP headers). That header still provides meaningful protection against MIME-sniffing attacks and has widespread browser support.</p>
<p dir="auto">Afaik, <code>X-Permitted-Cross-Domain-Policies</code> is still used by Acrobat (which is unfortunately far from dead), but I agree it's fair to remove it from the default configuration since it's an edge-case.</p>
]]></description><link>https://forum.cloudron.io/post/123161</link><guid isPermaLink="true">https://forum.cloudron.io/post/123161</guid><dc:creator><![CDATA[milian.hackradt]]></dc:creator><pubDate>Fri, 10 Apr 2026 14:49:55 GMT</pubDate></item><item><title><![CDATA[Reply to Remove deprecated X-XSS-Protection header from the nginx config on Fri, 10 Apr 2026 14:33:00 GMT]]></title><description><![CDATA[<p dir="auto">I think <code>X-Permitted-Cross-Domain-Policies</code> is for the long dead adobe flash which used to use some crossdomain.xml . <code>X-Content-Type-Options: nosniff</code> might be worth putting back. But over time, I have removed many headers like <code>X-Frame-Options</code> (which is in OWASP) because they are causing browser warnings.</p>
]]></description><link>https://forum.cloudron.io/post/123160</link><guid isPermaLink="true">https://forum.cloudron.io/post/123160</guid><dc:creator><![CDATA[girish]]></dc:creator><pubDate>Fri, 10 Apr 2026 14:33:00 GMT</pubDate></item><item><title><![CDATA[Reply to Remove deprecated X-XSS-Protection header from the nginx config on Fri, 10 Apr 2026 14:26:15 GMT]]></title><description><![CDATA[<p dir="auto">I just saw that you also removed <code>X-Content-Type-Options</code> as well as <code>X-Permitted-Cross-Domain-Policies</code>.</p>
<p dir="auto">OWASP <a href="https://cheatsheetseries.owasp.org/cheatsheets/HTTP_Headers_Cheat_Sheet.html" target="_blank" rel="noopener noreferrer nofollow ugc">1</a>, <a href="https://owasp.org/www-project-secure-headers/" target="_blank" rel="noopener noreferrer nofollow ugc">2</a> still recommends these headers so maybe it was a bit hasty to also remove them?</p>
]]></description><link>https://forum.cloudron.io/post/123159</link><guid isPermaLink="true">https://forum.cloudron.io/post/123159</guid><dc:creator><![CDATA[milian.hackradt]]></dc:creator><pubDate>Fri, 10 Apr 2026 14:26:15 GMT</pubDate></item><item><title><![CDATA[Reply to Remove deprecated X-XSS-Protection header from the nginx config on Fri, 10 Apr 2026 14:14:37 GMT]]></title><description><![CDATA[<p dir="auto">Thank you!</p>
]]></description><link>https://forum.cloudron.io/post/123158</link><guid isPermaLink="true">https://forum.cloudron.io/post/123158</guid><dc:creator><![CDATA[milian.hackradt]]></dc:creator><pubDate>Fri, 10 Apr 2026 14:14:37 GMT</pubDate></item><item><title><![CDATA[Reply to Remove deprecated X-XSS-Protection header from the nginx config on Fri, 10 Apr 2026 14:08:56 GMT]]></title><description><![CDATA[<p dir="auto">Thanks for reporting, I have removed these.</p>
]]></description><link>https://forum.cloudron.io/post/123157</link><guid isPermaLink="true">https://forum.cloudron.io/post/123157</guid><dc:creator><![CDATA[girish]]></dc:creator><pubDate>Fri, 10 Apr 2026 14:08:56 GMT</pubDate></item></channel></rss>