Skip to content

CSRF Protection

CSRF (Cross-Site Request Forgery) is a type of attack that occurs when a malicious website, email, or program causes a user's web browser to perform an unwanted action on a trusted site for which the user is currently authenticated.

Monarch provides a simple CSRF protection mechanism to help prevent these types of attacks. This protection is enabled by default and works by adding a CSRF token to forms and verifying the token on form submission.

Generating a CSRF Token

To protect your forms from CSRF attacks, you need to generate a CSRF token and include it in your form. Monarch provides a helper function to generate a CSRF token inside a hidden input field:

<?= csrfInput() ?>
// Generates: <input type="hidden" name="csrf_token" value="...">

You can further increase the security of the page by locking the CSRF token to the current URI. This will use a second token that is unique to the current page as part of a hash to generate the CSRF token:

<?= csrfInput(true) ?>

Manually Generating a CSRF Token

If you need to generate a CSRF token manually, you can use the csrf() function:

$response->withHeader(new Header('X-CSRF-Token', csrf()));

Verifying a CSRF Token

When a form is submitted within a POST request, the Security middleware will automatically verify the CSRF token. If the token is invalid, the request will be rejected with a 403 Forbidden status code and a message will be displayed.

If you need to manually verify a CSRF token, you can use the veirfy function of the CSRF class:

use Monarch\HTTP\CSRF;

if (!CSRF::verify($token) {
    // Handle invalid CSRF token
}