Skip to main content
Security fix guide

No Clickjacking Protection

Neither X-Frame-Options nor CSP frame-ancestors is set. The site can be embedded in malicious iframes for clickjacking attacks.

Issue ID: SEC-CLICKJACK-001
Severity: medium
Impact: Med
Effort: S

Use this article when

  • You need deeper remediation guidance than the issue card can show.
  • You want CMS-specific steps before handing the fix to a developer.
  • You want a repeatable re-check path after shipping the change.
Re-run full audit

What this issue is

Neither X-Frame-Options nor CSP frame-ancestors is set. The site can be embedded in malicious iframes for clickjacking attacks.

Why it matters

Neither X-Frame-Options nor CSP frame-ancestors is set. The site can be embedded in malicious iframes for clickjacking attacks. This affects browser trust signals and whether visitors feel safe submitting contact details.

How we detect it

  • FreeSiteAudit flags this issue when the rule for SEC-CLICKJACK-001 fails and the page evidence points to Http headers.
  • You can usually confirm this by checking the page source or the relevant page settings inside your CMS.

Evidence examples

Check the affected page source, rendered output, or relevant CMS setting to confirm the missing or incorrect element.

How to fix it

  1. 1Add X-Frame-Options: SAMEORIGIN (or DENY) to server responses
  2. 2Or use CSP: Content-Security-Policy: frame-ancestors 'self'
  3. 3Both headers prevent the page from being embedded in iframes on other sites

How to re-check it

  • Check response headers for X-Frame-Options or frame-ancestors in CSP

Related tools

This issue is best verified with the full FreeSiteAudit crawl rather than a single-point mini tool.