Skip to content
This repository was archived by the owner on Feb 15, 2026. It is now read-only.

privacy: don't leak origin via referer header#4295

Open
slydetector wants to merge 1 commit intosct:developfrom
slydetector:no-referrer-header
Open

privacy: don't leak origin via referer header#4295
slydetector wants to merge 1 commit intosct:developfrom
slydetector:no-referrer-header

Conversation

@slydetector
Copy link

@slydetector slydetector commented Nov 24, 2025

Description

Overseerr web-ui leaks the origin site URL via the Referer http request header when loading resources from some 3rd party websites. Examples include:

  • Logging in: https://plex.tv/users/<redacted>/avatar?c=<redacted>
  • Loading home page: https://fonts.gstatic.com/s/inter/v20/UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa1ZL7W0Q5nw.woff2
  • Loading settings page: https://secure.gravatar.com/avatar/<redacted>?d=<redacted>

I've got image caching enabled atm, but when disabled, loading images from tmdb & friends also leaks the origin via referer header.

Unless the referrer header is necessary for correct functionality, it would be a good idea to set a site wide referrer policy to no-referrer in the interest of privacy.

Tested with the change I'm not seeing the referer header being sent anymore.

@stale
Copy link

stale bot commented Feb 4, 2026

This pull request has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@stale stale bot added the stale label Feb 4, 2026
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant