SecurityError: Blocked a frame with origin from accessing a cross-origin frame

  1. Home
  2. javascript
  3. SecurityError: Blocked a frame with origin from accessing a cross-origin frame

I am loading an <iframe> in my HTML page and trying to access the elements within it using Javascript, but when I try to execute my code, I get the following error:

SecurityError: Blocked a frame with origin "http://www.<domain>.com" from accessing a cross-origin frame.

Can you please help me to find a solution so that I can access the elements in the frame?

I am using this code for testing, but in vain:

$(document).ready(function() {
    var iframeWindow = document.getElementById("my-iframe-id").contentWindow;

    iframeWindow.addEventListener("load", function() {
        var doc = iframe.contentDocument || iframe.contentWindow.document;
        var target = doc.getElementById("my-target-id");

        target.innerHTML = "Found it!";

First answer

Same-origin policy

Not to be confused with CORS!

You can’t access an <iframe> with different origin using JavaScript, it would be a huge security flaw if you could do it. For the same-origin policy browsers block scripts trying to access a frame with a different origin.

Origin is considered different if at least one of the following parts of the address isn’t maintained:


Protocol, hostname and port must be the same of your domain, if you want to access a frame.


Here’s what would happen trying to access the following URLs from

URL                                             RESULT       -> Success -> Success                    -> Success (default port for HTTP)                  -> Failure: different port       -> Failure: different hostname -> Failure: different protocol                     -> Failure: different protocol & port       -> Failure: different hostname & protocol 


Even though same-origin policy blocks scripts from accessing the content of sites with a different origin, if you own both the pages, you can work around this problem using window.postMessage and its relative message event to send messages between the two pages, like this:

  • In your main page:

    var frame = document.getElementById('your-frame-id'); 
    frame.contentWindow.postMessage(/*any variable or object here*/, '*'); 
  • In your <iframe> (contained in the main page):

    window.addEventListener('message', function(event) { 
        // IMPORTANT: Check the origin of the data! 
        if (~event.origin.indexOf('')) { 
            // The data has been sent from your site 
            // The data sent with postMessage is stored in 
        } else { 
            // The data hasn't been sent from your site! 
            // Be careful! Do not use it. 

This method can be applied in both directions, creating a listener in the main page too, and receiving responses from the frame. The same logic can also be implemented in pop-ups and basically any new window generated by the main page (e.g. using as well, without any difference.

Disabling same-origin policy in your browser

There already are some good answers about this topic (I just found them googling), so, for the browsers where this is possible, I’ll link the relative answer. However, please remember that disabling the same-origin policy (or the CORS) will only affect your browser. Also, running a browser with same-origin security settings disabled grants any website access to cross-origin resources, so it’s very unsafe and should be done for development purposes only.

Second answer

Check the domain’s web server for http://www.<domain>.com configuration for X-Frame-Options
It is a security feature designed to prevent clickJacking attacks,

How Does clickJacking work?

  1. The evil page looks exactly like the victim page.
  2. Then it tricked users to enter their username and password.

Technically the evil has an iframe with the source to the victim page.

    <iframe src=''/>
    <input id="username" type="text" style="display: none;/>
    <input id="password" type="text" style="display: none;/>
        //some JS code that click jacking the user username and input from inside the iframe...

How the security feature work

If you want to prevent web server request to be rendered within an iframe add the x-frame-options

X-Frame-Options DENY

The options are:

  1. SAMEORIGIN //allow only to my own domain render my HTML inside an iframe.
  2. DENY //do not allow my HTML to be rendered inside any iframe
  3. “ALLOW-FROM” //allow specific domain to render my HTML inside an iframe

This is IIS config example:

           <add name="X-Frame-Options" value="SAMEORIGIN" />

The solution to the question

If the web server activated the security feature it may cause a client-side SecurityError as it should.

Third answer

For me i wanted to implement a 2-way handshake, meaning:
– the parent window will load faster then the iframe
– the iframe should talk to the parent window as soon as its ready
– the parent is ready to receive the iframe message and replay

this code is used to set white label in the iframe using [CSS custom property]

$(function() {
    window.onload = function() {
        // create listener
        function receiveMessage(e) {
        window.addEventListener('message', receiveMessage);
        // call parent


$(function() {
    // create listener
    var eventMethod = window.addEventListener ? "addEventListener" : "attachEvent";
    var eventer = window[eventMethod];
    var messageEvent = eventMethod == "attachEvent" ? "onmessage" : "message";
    eventer(messageEvent, function (e) {
        // replay to child (iframe) 
                event_id: 'white_label_message',
                wl: {
                    header_bg: $('#Header').css('background-color'),
                    header_text: $('#Header .HoverMenu a').css('color'),
                    button_bg: $('#Header .HoverMenu a').css('background-color')
    }, false);

naturally you can limit the origins and the text, this is easy-to-work-with code
i found this examlpe to be helpful:
[Cross-Domain Messaging With postMessage]

Spread the love

Related articles

Comments are closed.