Published at
Updated at
Reading time
2min
This post is part of my Today I learned series in which I share all my web development learnings.

Here's Alex blogging about forbidden request headers. Forbidden what? Exactly!

It turns out that when using the fetch API (or if you're old school, XMLHttpRequest) there's a set of headers that you can't specify or overwrite from within JavaScript.

What are "forbidden request headers"?

The spec defines three different types of forbidden request headers.

First, all headers in this list are forbidden:

  • Accept-Charset
  • Accept-Encoding
  • Access-Control-Request-Headers
  • Access-Control-Request-Method
  • Connection
  • Content-Length
  • Cookie
  • Cookie2 (This seems to be a deprecated spec that never went anywhere)
  • Date
  • DNT
  • Expect
  • Host
  • Keep-Alive
  • Origin
  • Referer
  • Set-Cookie
  • TE
  • Trailer
  • Transfer-Encoding
  • Upgrade
  • Via

Second, headers starting with proxy- or sec- are also forbidden.

And third, if there's something going on with the parsed values of the headers X-HTTP-Method, X-HTTP-Method-Override, and X-Method-Override header they might be forbidden, too.

Apparently, you can overwrite or at least signal that the initial HTTP method should be a different one? I have so many questions, but I'll leave them for another time.

What happens when you try to set a forbidden header?

So, what happens if you try to set a forbidden header?

fetch('https://api.example.com/data', {
  headers: {
    'Content-Length': '100',  // This will be ignored
    'X-Custom-Header': 'This is fine'  // This will be sent
  }
})

Browsers will simply ignore them and maybe, if they're kind, log a warning.

This all makes sense because the spec states that there should be things the user agent remains in control of.

These are forbidden so the user agent remains in full control over them.

This behavior makes total sense to avoid nasty security loopholes. I can imagine that if JavaScript could overwrite every header it would open all kinds of security vulnerability doors.

If you want to dive deeper check out Alex's post, it's a nice one.

If you enjoyed this article...

Join 5.9k readers and learn something new every week with Web Weekly.

Web Weekly — Your friendly Web Dev newsletter
Reply to this post and share your thoughts via good old email.
Stefan standing in the park in front of a green background

About Stefan Judis

Frontend nerd with over ten years of experience, freelance dev, "Today I Learned" blogger, conference speaker, and Open Source maintainer.

Related Topics

Related Articles