CORS - Cross-Origin Resource Sharing
What It Is
Browser security mechanism that allows servers to specify which origins can access their resources, bypassing the same-origin policy.
The Problem
Same-origin policy blocks cross-domain requests by default:
// ❌ Blocked without CORS
// Page: https://myapp.com
fetch('https://api.external.com/data')
How It Works
- Browser sends request with
Origin
header - Server responds with CORS headers (or doesn't)
- Browser allows/blocks based on server response
For complex (non-simple) requests, browser sends preflight OPTIONS request first.
Complex/Non-Simple Requeset that triggers OPTIONS preflight
Complex/Non-Simple CORS Requests & OPTIONS Preflight
What is a Non-Simple CORS Request?
A non-simple (or complex) CORS request is any cross-origin request that doesn't meet the criteria for a "simple request". These requests trigger an automatic OPTIONS preflight request from the browser before the actual request is sent.
Simple vs Non-Simple Requests
Simple requests must meet ALL of the following criteria:
- Method: Only
GET
,HEAD
, orPOST
- Headers: Only CORS-safelisted headers like:
Accept
Accept-Language
Content-Language
Content-Type
(with specific values only)Origin
(automatically added by browsers)
- Content-Type: Only these values:
application/x-www-form-urlencoded
multipart/form-data
text/plain
Non-Simple Requests (Triggers Preflight)
Any request that violates the simple request criteria becomes non-simple:
1. Non-Simple HTTP Methods
PUT, DELETE, PATCH, OPTIONS, CONNECT, TRACE
2. Custom or Non-Safelisted Headers
Authorization
X-Requested-With
X-Custom-Header
Content-Type: application/json
3. Non-Simple Content-Types
application/json
application/xml
text/xml
The Preflight Flow
- Browser sends OPTIONS request to check permissions
- Server responds with allowed methods, headers, and origins
- If approved, browser sends the actual request
- If denied, browser blocks the request
Examples of Non-Simple Requests
These JavaScript requests would trigger OPTIONS preflight:
// Custom method
fetch('http://api.com/data', { method: 'PUT' })
// JSON content type
fetch('http://api.com/data', {
method: 'POST',
headers: { 'Content-Type': 'application/json' },
body: JSON.stringify({})
})
// Custom header
fetch('http://api.com/data', {
headers: { 'Authorization': 'Bearer token' }
})
⚠️ Important Note About usage curl
curl does NOT send preflight OPTIONS requests. It only sends the exact request you specify. To see the complete CORS preflight behavior, you must test from:
- A web browser
- Browser developer tools
- Testing tools that simulate browser CORS behavior
curl is useful for testing the server's response to individual requests, but won't replicate the full browser CORS flow.
Key Headers
Server must send:
Access-Control-Allow-Origin: https://myapp.com
(required)Access-Control-Allow-Methods: GET, POST, PUT
Access-Control-Allow-Headers: Content-Type, Authorization
Browser automatically sends:
Origin: https://myapp.com
Quick Examples
Allow specific origin:
Access-Control-Allow-Origin: https://myapp.com
Allow all (development only):
Access-Control-Allow-Origin: *
Express.js setup:
app.use((req, res, next) => {
res.header('Access-Control-Allow-Origin', 'https://myapp.com');
next();
});
Key Points
- Server-side fix only - API being called must send CORS headers
- Security rule: Never use
*
with credentials - Preflight: Complex requests trigger OPTIONS preflight
- Localhost binding: Bind server to
127.0.0.1
for local-only access
Common Error
Access to fetch at 'https://api.com' from origin 'https://myapp.com'
has been blocked by CORS policy
Fix: Configure CORS headers on api.com
, not myapp.com
Children
- Complex/Non-Simple CORS Requeset that triggers OPTIONS preflight
- Simple CORS Requests (No Options Preflight)
Backlinks