Join the Webstudio community

Updated 3 weeks ago

Securing Websites Against Clickjacking in the Healthcare Industry

At a glance

The community members discuss adding X-Frame-Options to protect against clickjacking, particularly for websites in the healthcare industry. They explore alternative solutions like SameSite cookie attributes and frame-breaking scripts. Some community members suggest that the restriction should have been an opt-in feature rather than the default, as it caused issues for those who needed to embed their sites in iframes. The community members indicate that they will consider adding an option to allow iframe embedding for trusted sites.

<answer>We actually lost a use case where some people need to be able to embed their site in the iframe. Not sure this was the right move to have the restriction by default. It should have been an opt-in feature.</answer>
Useful resources
Are you guys able to add X frame options to the servers because I don't want other people to iframe the websites I make? (cause I'm in the healthcare industry, I don't want to be vulnerable to clickjacking)
Marked as solution
We actually lost a use case where some people need to be able to embed their site in the iframe. Not sure this was the right move to have the restriction by default.

It should have been an opt-in feature.
View full solution
1
I
b
O
31 comments
Do you know specific case, like you have a site without SameSite cookie attributes or what?
Cookies with a SameSite attribute of either strict or lax will not be included in requests so it's already a good prevention. Does anyone modern days use none?
What's SameSite cookie attributes? does it solve the embeding problem and is it easy to setup in webstudio?
clickjacking is valid if it's used during some login process, etc. So some actions will be executed on user behalf
So user need to be logged in
SOmewhere, i.e. have cookies
We don't have sessions or logins, so Ive asked about specific uecase you have
btw, is there a way that I can get an A for a webstudio from this tester, using get it close to that with other builders: https://securityheaders.com/?q=https%3A%2F%2Fmarketplace-saas-landing-page-vv5th.wstd.io&followRedirects=on
Ok gotcha to have A point from some tool -) it's valid concern, we will check
appreciate it 🙏
We will try to add it ASAP
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options

x-frame-options are deprecated, browser vendors are telling not to use it, that makes it look like the testing tool is outdated
Ok. It's not that I care about having x frame options, it's more of protecting my site from clickjacking, and if there's anything I can do protect against that
Hi, Ivan! I noticed that my iframe embedding for my Webstudio site stopped working on my Weblium site, possibly after your recent update to enhance clickjacking protection. Could you please advise on how I can modify the security settings to allow embedding on specific trusted sites (e.g., my Weblium site)? If there’s a way to configure the Content-Security-Policy or X-Frame-Options headers to permit this while maintaining security, I’d appreciate your guidance.
interesting situation, may I ask what is the use case? why are you embedding webstudio site inside weblium site?
Hi, Oleg! The embedded Webstudio page displays a list of upcoming events pulled from an Airtable base. My client prefers a no-code/low-code solution to manage their site independently, so I initially used Weblium for the main platform and Webstudio for the event list embed. At the time, Webstudio’s content mode wasn’t available, so this setup was the best option. If there’s a way to enable iframe embedding for trusted sites like my Weblium project, I’d appreciate your advice!
pls dm me your project
right now there is none, we will whitelist your project and then consider adding an option
@Arisa plz check
Yes, it's working now. Thank you both!!
@Ivan Starkov and @Oleg Isonen, I just noticed this, you are the goat! thanks a lot!
We actually lost a use case where some people need to be able to embed their site in the iframe. Not sure this was the right move to have the restriction by default.

It should have been an opt-in feature.
I am still considering removing it by default and letting users opt-in via settings.
after our conversation, I also realized that as well, but if it was an option for each website, it would be great
I will ping you directly if we decide to add the setting and remove the default, so you can switch.
Add a reply
Sign up and join the conversation on Discord