Testing

SameSite Cookie Attribute: Browser Support, Values, Defaults

The SameSite cookie attribute works in Chrome 51+, Edge 16+, Firefox 60+, Opera 39+, Samsung Internet 5+, and Safari 13+ on macOS and iOS. Learn the values and quirks.

Author

Prince Dewani

May 6, 2026

The SameSite cookie attribute is an HTTP cookie flag from RFC 6265bis that tells a browser whether to send a cookie on cross-site requests. It works in Chrome 51+, Edge 16+, Firefox 60+, Opera 39+, Samsung Internet 5+, and Safari 13+ on macOS and iOS, while Internet Explorer 11 added only partial support.

This guide covers what the SameSite attribute is, the browsers that support it, the three values, the default behavior, how it mitigates CSRF, and the known issues.

Note

Note: SameSite cookie behavior breaks across older Safari, iOS, and Internet Explorer builds. Test it on real browsers and OS with TestMu AI. Try TestMu AI free!

What is the default SameSite behavior in modern browsers?

Browsers fall into two camps for cookies that omit the SameSite attribute. Chromium-based browsers apply SameSite=Lax as the default, while Firefox and Safari leave the cookie with no SameSite enforcement and rely on their tracking-prevention layers to block obvious cross-site sends.

  • Chrome, Edge, and Opera: Apply SameSite=Lax by default from Chrome 80, Edge 86, and Opera 67. A cookie sent without SameSite is treated as Lax for the first two minutes after creation under the Lax-allow-unsafe rule, then strict Lax behavior takes over.
  • Firefox: Does not apply Lax by default. The about:config preference network.cookie.sameSite.laxByDefault can flip the behavior for testing, but the shipped default leaves cookies with no SameSite enforcement. Set the attribute explicitly on every cookie.
  • Safari: Applies its own Intelligent Tracking Prevention rules instead of a Lax default, so cookies missing SameSite still travel cross-site under most conditions. Set the attribute to lock down behavior.
  • Samsung Internet: Inherits the Chromium Lax-by-default behavior from Samsung Internet 13.0, which tracks Chromium 80.
...

How does SameSite mitigate CSRF attacks?

The SameSite cookie attribute is the simplest server-side CSRF defense in the modern web. It blocks the browser from sending session cookies on cross-site state-changing requests, which removes the foundation of most cross-site request forgery patterns.

  • Strict blocks every cross-site send: Even a click on a link from another site does not include the cookie, so an attacker page cannot ride a victim's session at all.
  • Lax blocks unsafe methods: A cross-site POST, PUT, or DELETE never carries the cookie, while top-level GET navigations still work. This balance covers the bulk of CSRF vectors without breaking inbound links from search engines and email.
  • None reopens the door: Cookies marked SameSite=None ride every cross-site request, so they need a separate CSRF token or origin check to stay safe.
  • Pair SameSite with a CSRF token: Even with Lax or Strict in place, OWASP recommends a synchronizer-token or double-submit-cookie pattern as a second layer for state-changing endpoints.
  • Validate the Origin and Referer headers: Server-side checks on the Origin or Referer header catch cross-site requests on browsers that do not enforce SameSite, such as IE 11 with SameSite=None.
...

Citations

All SameSite cookie attribute version numbers and platform notes in this guide come from these primary sources:

Author

Prince Dewani is a Community Contributor at TestMu AI, where he manages content strategies around software testing, QA, and test automation. He is certified in Selenium, Cypress, Playwright, Appium, Automation Testing, and KaneAI. Prince has also presented academic research at the international conference PBCON-01. He further specializes in on-page SEO, bridging marketing with core testing technologies. On LinkedIn, he is followed by 4,300+ QA engineers, developers, DevOps experts, tech leaders, and AI-focused practitioners in the global testing community.

Open in ChatGPT Icon

Open in ChatGPT

Open in Claude Icon

Open in Claude

Open in Perplexity Icon

Open in Perplexity

Open in Grok Icon

Open in Grok

Open in Gemini AI Icon

Open in Gemini AI

Copied to Clipboard!
...

3000+ Browsers. One Platform.

See exactly how your site performs everywhere.

Try it free
...

Write Tests in Plain English with KaneAI

Create, debug, and evolve tests using natural language.

Try for free

Frequently asked questions

Did you find this page helpful?

More Related Hubs

TestMu AI forEnterprise

Get access to solutions built on Enterprise
grade security, privacy, & compliance

  • Advanced access controls
  • Advanced data retention rules
  • Advanced Local Testing
  • Premium Support options
  • Early access to beta features
  • Private Slack Channel
  • Unlimited Manual Accessibility DevTools Tests