Django modern CSRF protection using Fetch metadata request headers, without tokens, cookies or custom headers. No
more CSRF token errors, csrf_token in your templates or configuring frontend clients to deal with X-CSRFToken.
Django's default CSRF protection relies on tokens and cookies. While
this works well and is secure, there are more
modern ways to protect against CSRF attacks, without requiring to submit CSRF tokens to the server via forms, cookies or
custom headers.
Fetch metadata request headers
provide a way to protect against CSRF attacks without requiring token verifications. The Sec-Fetch-Site in particular,
tells the server whether the request is same origin, cross-origin, same site or user initiated. With that information,
the server can decide whether to allow the request or not.
To learn more about Fetch metadata request headers and how they can be used for web security, check out this article by Google.
According to Can I Use, the Sec-Fetch-Site header is supported
by 97.63% and Origin
by 99.83% of all tracked browsers.
This package is designed to require minimal changes to your existing Django project.
- Install the package:
pip install django-modern-csrf- Add
modern_csrfto yourINSTALLED_APPS:
# settings.py
INSTALLED_APPS = [
...
"modern_csrf",
...
]- Replace the default CSRF middleware with the new one (in the same position):
# settings.py
# Old
MIDDLEWARE = [
...
"django.middleware.csrf.CsrfViewMiddleware",
...
]
# New
MIDDLEWARE = [
...
"modern_csrf.middleware.ModernCsrfViewMiddleware",
...
]- That should be it for most projects. However, if you are using the
@csrf_protectdecorator, you will need to replace it with this package's@csrf_protect.
# Old
from django.views.decorators.csrf import csrf_protect
# Replace with
from modern_csrf.decorators import csrf_protect- That's it! You can remove all references to
{% csrf_token %}or{{ csrf_token }}from your templates. You can also remove any code in your JavaScript clients that sets theX-CSRFTokenheader, as there are no more token checks in place. Enjoy your tokenless CSRF protection!
The implementation for this package is based on the Go standard library's protection against CSRF attacks. The implementation can be seen here, along with the research by the author who implemented it.
The ModernCsrfViewMiddleware is a drop-in replacement for the default CsrfViewMiddleware that uses the
Sec-Fetch-Site header to determine whether to allow the request or not. Below is a description of how it works:
-
Skip CSRF protection if the view is explicitly marked as CSRF-exempt.
-
Allow all GET, HEAD, OPTIONS, or TRACE requests.
These are safe methods as defined by RFC 9110, and are assumed not to change state.
-
If the
Sec-Fetch-Siteheader is present:- if its value is
same-originornone, allow the request; - otherwise, check if the
Originheader is verified against trusted origins (Django'sCSRF_TRUSTED_ORIGINS); - if the Origin is verified, allow the request;
- otherwise, reject the request.
This leverages modern browser security headers to detect cross-origin requests. The
Sec-Fetch-Siteheader is automatically sent by modern browsers and provides reliable origin information. - if its value is
-
If the
Originheader is present but doesn't match any trusted origin, reject the request.This catches cross-origin requests from browsers that don't support
Sec-Fetch-Sitebut do sendOriginheaders. -
If neither the
Sec-Fetch-Sitenor theOriginheaders triggered a rejection, allow the request.This is the default fallback for requests that don't present obvious cross-origin indicators. Those requests are most likely from command line tools or other non-browser clients.
Origin verification checks three conditions:
- (1) the Origin matches the current request's origin (scheme + host + port if present),
- (2) the Origin is in the
CSRF_TRUSTED_ORIGINSallow-list as an exact match, - (3) the Origin's domain is a subdomain of an allowed wildcard entry in
CSRF_TRUSTED_ORIGINS.
This approach prioritizes the Sec-Fetch-Site header, which provides the most reliable protection for modern browsers, while maintaining backward compatibility through Origin header validation. The algorithm has no false negatives in browsers that support Sec-Fetch-Site (all major browsers since 2020), and degrades gracefully for older browsers.
Thanks to Filippo Valsorda for the research and implementation of Go's
CrossOriginProtection which this package is based on.