Advertisements

headerup to 320x100 / 728x90

CORS Origin Checker

Test whether origins are allowed by a given Access-Control-Allow-Origin value — wildcard and subdomain aware

Input
Loading editor...
Output

Output will appear here...

Advertisements

content bottomup to 300x250

What is CORS Origin Checker

Last reviewed:

CORS Origin Checker takes an `Access-Control-Allow-Origin` value (or comma-separated list, or `*`) and tests a batch of origins against it. Subdomain wildcards (e.g. `*.example.com`) are supported.

It also flags credentials-incompatible configurations: a wildcard origin cannot be used together with credentialed requests.

Why use it

  • Validate CORS rules before deploying.
  • Triage 'blocked by CORS' errors quickly.
  • Teach CORS behaviour with real examples.
  • Check multi-origin allowlists.
  • Spot credentials/wildcard misconfigurations.

Features

  • Exact origin matching
  • Comma-list + wildcard subdomain
  • Credentials-safe flag
  • Batch test many origins
  • Zero-upload CORS Origin pipeline, nothing touches a server

How to use CORS Origin Checker

  1. Paste allow-origin. Line 1 — the header value.
  2. Paste origins. Lines 2+ — one origin per line.
  3. Run. Each origin gets an ALLOWED / BLOCKED verdict.

Example (before/after)

Input

*.example.com, https://admin.example.org
https://shop.example.com
https://admin.example.org
https://attacker.com

Verdicts

Allow-Origin header value: *.example.com, https://admin.example.org
Credentials-safe: Yes

ALLOWED (wildcard subdomain)        https://shop.example.com
ALLOWED (exact match)               https://admin.example.org
BLOCKED                             https://attacker.com

Common errors

Wildcard + credentials

Browsers block '*' with credentials.

Fix: Use an explicit origin list when cookies or auth are involved.

Trailing slashes

Origins are hostnames, not URLs with paths.

Fix: Remove paths — include scheme + host only.

FAQ

Does it support wildcard subdomains?

Yes — `*.example.com` matches any subdomain.

Does it test credentials-mode?

It flags wildcard + credentials as unsafe.

Is input uploaded?

No — the checker runs client-side.

Does it make real requests?

No — it's a pure rule checker.

Does it handle protocol mismatches?

Yes — https://… and http://… are treated as distinct origins.