HawkScan Test Info for HTTPS to HTTP Insecure Transition in Form Post

HTTPS to HTTP Insecure Transition in Form Post


Plugin Id: 10042 | CWE: 319


To remediate this vulnerability, it is necessary to ensure that all form submissions on secure HTTPS pages are also sent securely over HTTPS. This can be achieved by following these steps:

  1. Update form action URLs: Make sure that the form action URLs are using the HTTPS protocol instead of HTTP. This can be done by modifying the HTML code of the form and changing the action attribute to use the HTTPS protocol.


    <form action="https://example.com/submit-form" method="post">
  2. Enable HTTPS on the form submission endpoint: Ensure that the server hosting the form submission endpoint supports HTTPS and has a valid SSL/TLS certificate installed. This will allow the form data to be securely transmitted from the user’s browser to the server.

    Example (Apache configuration):

    <VirtualHost *:443>
        ServerName example.com
        DocumentRoot /var/www/html
        SSLEngine on
        SSLCertificateFile /path/to/certificate.crt
        SSLCertificateKeyFile /path/to/private.key
  3. Test and verify: After making the necessary changes, thoroughly test the form submission process to ensure that data is being transmitted securely over HTTPS. Verify that the form action URLs are using HTTPS and that the browser’s address bar displays the secure padlock icon.


This vulnerability check identifies instances where a secure HTTPS page contains forms that submit data to insecure HTTP endpoints. The issue arises when a user submits data through a form on a secure page, mistakenly assuming that the data is being transmitted securely. However, the form action URL uses the insecure HTTP protocol, resulting in a transition from a secure page to an insecure page during the form submission process.


The risks associated with this vulnerability include:

  • Data interception: When form data is transmitted over an insecure HTTP connection, it can be intercepted by attackers. This puts sensitive information, such as login credentials or personal data, at risk of being compromised.
  • Loss of user trust: Users may lose trust in the website if they discover that their data is being transmitted insecurely. This can lead to a negative perception of the website’s security practices and potentially result in a loss of business or reputation.
  • Compliance violations: Depending on the nature of the data being transmitted, this vulnerability may violate regulatory requirements or industry standards related to data security and privacy. This can lead to legal and financial consequences for the organization.