CSP: object-src

The HTTP Content-Security-Policy object-src directive specifies valid sources for the <object> and <embed> elements.

Note: Elements controlled by object-src are perhaps coincidentally considered legacy HTML elements and aren't receiving new standardized features (such as the security attributes sandbox or allow for <iframe>). Therefore it is recommended to restrict this fetch-directive (e.g. explicitly set object-src 'none' if possible).

CSP version 1
Directive type Fetch directive
default-src fallback Yes. If this directive is absent, the user agent will look for the default-src directive.

Syntax

One or more sources can be allowed for the object-src policy:

http
Content-Security-Policy: object-src <source>;
Content-Security-Policy: object-src <source> <source>;

Sources

<source> can be any one of the values listed in CSP Source Values.

Note that this same set of values can be used in all fetch directives (and a number of other directives).

Examples

Violation cases

Given this CSP header:

http
Content-Security-Policy: object-src https://example.com/

The following <object> and <embed> elements are blocked and won't load:

html
<embed src="https://not-example.com/flash"></embed>
<object data="https://not-example.com/plugin"></object>

Specifications

Specification
Content Security Policy Level 3
# directive-object-src

Browser compatibility

BCD tables only load in the browser

See also