CSP: object-src

Baseline Widely available

This feature is well established and works across many devices and browser versions. It’s been available across browsers since August 2016.

The HTTP Content-Security-Policy object-src directive specifies valid sources for the <object> and <embed> elements.

Note: Elements controlled by object-src are perhaps coincidentally considered legacy HTML elements and aren't receiving new standardized features (such as the security attributes sandbox or allow for <iframe>). Therefore it is recommended to restrict this fetch-directive (e.g. explicitly set object-src 'none' if possible).

CSP version 1
Directive type Fetch directive
default-src fallback Yes. If this directive is absent, the user agent will look for the default-src directive.

Syntax

http
Content-Security-Policy: object-src 'none';
Content-Security-Policy: object-src <source-expression-list>;

This directive may have one of the following values:

'none'

No resources of this type may be loaded. The single quotes are mandatory.

<source-expression-list>

A space-separated list of source expression values. Resources of this type may be loaded if they match any of the given source expressions.

Source expressions are specified as keyword values or URL patterns: the syntax for each source expression is given in CSP Source Values.

Examples

Violation cases

Given this CSP header:

http
Content-Security-Policy: object-src https://example.com/

The following <object> and <embed> elements are blocked and won't load:

html
<embed src="https://not-example.com/flash"></embed>
<object data="https://not-example.com/plugin"></object>

Specifications

Specification
Content Security Policy Level 3
# directive-object-src

Browser compatibility

BCD tables only load in the browser

See also