Need help with OWASP-CSRFGuard?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

151 Stars 127 Forks 206 Commits 32 Opened issues


OWASP CSRFGuard 3.1.0

Services available


Need anything else?

Contributors list


We are working on a new version of CSRFGuard including a lot of merge request with good proposals and new code to fix known issues on XSS attacks that bypass CSRFGuard.

Pleasse open all request and issue in the official OWASP CSRFGuard repo here:

We need your help. If you want to give few hours of your time to help us please contact me.

OWASP CSRFGuard 3.1.0

BSD License, All rights reserved.


Welcome to the home of the OWASP CSRFGuard Project! OWASP CSRFGuard is a library that implements a variant of the synchronizer token pattern to mitigate the risk of Cross-Site Request Forgery (CSRF) attacks. The OWASP CSRFGuard library is integrated through the use of a JavaEE Filter and exposes various automated and manual ways to integrate per-session or pseudo-per-request tokens into HTML. When a user interacts with this HTML, CSRF prevention tokens (i.e. cryptographically random synchronizer tokens) are submitted with the corresponding HTTP request. It is the responsibility of OWASP CSRFGuard to ensure the token is present and is valid for the current HTTP request. Any attempt to submit a request to a protected resource without the correct corresponding token is viewed as a CSRF attack in progress and is discarded. Prior to discarding the request, CSRFGuard can be configured to take one or more actions such as logging aspects of the request and redirecting the user to a landing page. The latest release enhances this strategy to support the optional verification of HTTP requests submitted using Ajax as well as the optional verification of referrer headers.

Project Lead

The CSRFGuard project is run by Azzeddine RAMRAMI. He can be contacted at azzeddine.ramrami AT


OWASP CSRFGuard 3.1.0 is offered under the BSD license

Using with Maven

OWASP CSRFGuard 3.1.0 will be available on Maven Central. Add the following dependency to your Maven POM file to use the library:


Building the code

  1. Make sure you have Apache Maven 3.0.4 or higher installed
  2. Clone this repository locally
  3. Build the project by running
    mvn clean install
    in the project root directory
  4. Build and run the test JSP web application by running
    mvn pre-integration-test -Pdeploy-jsp-webapp -pl csrfguard-test/csrfguard-test-jsp
    mvn -Pdeploy-jsp-webapp -pl csrfguard-test/csrfguard-test-jsp tomcat7:run
  5. Optional: you can use
    to enable remote debugging, then connect your IDE to it (default port is 8000)
  6. Use a web browser to access
    to open the home page of the test project

Uploading to the Maven Central repository

  1. Follow the Sonatype Open-Source Project Maven Repository Usage Guide to create a Sonatype user account;
  2. Next, open a support request to get your newly created username added to the Maven groupId
  3. Once the support request has been completed, follow the instructions in the Sonatype Maven repository usage guide mentioned above to upload new versions to the Maven Central repository.

Email List

You can sign up for the OWASP CSRFGuard email list here.

Last News

An important security fix has been applied to the CSRFGuard version 3.0.

Do a token pre-fetch on every page.

Instead of hard coding the CSRF token, we send a POST request to fetch the token and populate the JS variable.

Thanks to Ahamed Nafeez [email protected] for this fix.

CSRFGuard in Maven Central

You can download a binary version from Maven Central here:;gav~~csrfguard~~~

Thanks to Trent Schmidt and Joel Orlina (JIRA) for there help.

CSRFGuard integration with a JSF application

Yi SONG create for CSRFGuard project a simple example to demostrate the CSRFGuard integration with a JSF application.

The original JSF project is taken from

After integrating with csrfguard, the project has been tested on netbean 8.2 with glassfish 4.1.1

Yi SONG Bio:

Yi SONG received my master of engineering in China in 2006. Then I start work for Axalto, then Gemalto and then Thales till now. He has 3 years experience on smartcard development, 10 years experience on cryptography and hardware security module. Since end of 2018, his work is focusing on web application and cloud.

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.