Security Risks in Responsive Web Design Frameworks
Abstract
1. Introduction
2. Literature Review
2.1. User Interface and User Experience
2.2. Security Aspects in Web Development
3. Materials and Methods
3.1. Materials
3.2. Methods
4. Results
4.1. Security Risks
- Y (Identified): The risk is explicitly documented via CVEs, official security advisories, or consistently demonstrated in the literature as an intrinsic vulnerability of the framework’s native components or required dependencies (e.g., XSS in native JavaScript modals).
- N (Not Identified): A systematic review of the framework’s architecture, documentation, and vulnerability databases yielded no empirical evidence or logical pathway for this specific risk to materialize directly from the framework’s features.
- P (Potential): The risk’s materialization is conditional. It does not exist as a default vulnerability but can be easily introduced through specific developer configurations, dynamic build-time interpolations (e.g., arbitrary value injection in Tailwind), or the adoption of unsafe legacy practices associated with the framework’s ecosystem.
| Methodological Phase | Bootstrap | Tailwind CSS | Foundation | Pure CSS | Skeleton |
|---|---|---|---|---|---|
| Code Injection (SQL/Command Injection) | N | N | N | N | N |
| Cross-Site Scripting (XSS) | Y | P | Y | N | N |
| Cross-Site Request Forgery (CSRF) | N | N | N | N | N |
| Exposure of Sensitive Data | P | P | P | P | P |
| Weak Authentication and Session Management | N | N | N | N | N |
| Misconfigured Security Settings | P | P | Y | P | P |
| Vulnerable Third-Party Dependencies and Libraries | Y | P | Y | N | N |
| Access Control Failures | P | N | P | N | N |
| Insufficient Communication Security (TLS/SSL) | N | N | N | N | N |
| Negligent Input Validation and Sanitization | P | N | P | N | N |
| Denial of Service Attacks (DoS/DDoS) | N | N | Y | N | N |
| Mixed Content Issues | P | N | P | P | P |
| Insufficient Testing | N | P | Y | P | Y |
| Insecure APIs | N | N | N | N | N |
4.2. Mitigation Strategies
4.2.1. Comprehensive Defense-in-Depth Strategies
| HTTP Content-Security-Policy: object-src 'none'; script-src 'nonce-{RANDOM}' 'unsafe-inline' 'unsafe-eval' 'strict-dynamic' https: http:; base-uri 'none'; report-uri https://seuservidor.com/csp-report |
- 1.
- Nonces for Styles: If the build infrastructure allows it, inject the same nonce used for scripts into the generated <style> tags.
- 2.
- SHA-256 Hashes: For static inline styles that do not change, compute the hash of the content and add it to the policy.
- 3.
- Calculated Risk (unsafe-inline for styles): In many production scenarios with legacy frameworks (such as older versions of Foundation or modified Skeleton), it may be necessary to allow ‘unsafe-inline’ for style-src only. Although this allows CSS injection, the impact is generally less than JavaScript execution, limited to defacement or data exfiltration (covered in Section 4.2.5), but not total session compromise.
- HTML Context: Characters such as < and > must be converted to HTML entities.
- Attribute Context: Data inserted into attributes (e.g., class=“...” in Tailwind or data-bs-content in Bootstrap) must be strictly validated to prevent attribute “escape” or the injection of event handlers (such as onmouseover).
- JavaScript context: Data interpolated into script blocks must be serialized as secure JSON or encoded in Unicode.
- Permissions-Policy (formerly Feature-Policy): This header allows developers to disable powerful and rarely used browser APIs that could be exploited if a framework component were compromised (e.g., geolocation, camera, microphone). For an institutional website using PureCSS or Skeleton, a restrictive policy such as geolocation=(), camera=(), microphone=() drastically reduces the impact of a successful XSS attack.
- X-Content-Type-Options: nosniff: Prevents the browser from “guessing” the file type, mitigating attacks where image files containing malicious code (polyglots) are executed as scripts or styles.
- Referrer-Policy: strict-origin-when-cross-origin: Prevents sensitive data contained in URLs (such as password reset tokens or session IDs) from leaking to third parties via the Referer header.
4.2.2. Analysis and Mitigation: Bootstrap (v5 and Legacy)
- Strict AllowList Configuration: Modify the default allowlist to remove unnecessary tags and attributes. If the tooltip only needs bold and italics, remove support for img or other elements.
- Integration with DOMPurify: For robust security, it is recommended to bypass Bootstrap’s internal sanitizer in favor of DOMPurify, passing a custom sanitization function when initializing the component.
| JavaScript const myTooltipEl = document.getElementById('myTooltip'); const tooltip = new bootstrap.Tooltip(myTooltipEl, { html: true, sanitizeFn: function (content) { return DOMPurify.sanitize(content, { ALLOWED_TAGS: ['b', 'i', 'em', 'strong'], // Strict whitelist ALLOWED_ATTR: }); } }); |
- Manual Patching: Developers should implement aggressive sanitization of any user input that could end up in data-target attributes.
- WAF (Web Application Firewall): Configuring WAF rules to block requests containing selector injection patterns (such as data-target=“<script>...”) is a necessary compensating layer for systems that cannot be refactored.
4.2.3. Analysis and Mitigation: Tailwind CSS
| JavaScript // UNSAFE const className = `text-[${userInput}]`; // SAFE const colorMap = { red: 'text-red-500', blue: 'text-blue-500', default: 'text-gray-500' }; const className = colorMap[userInput] | |
- Prohibition of String Interpolation: The golden rule in Tailwind is to never interpolate user input directly into class names. Instead, input should be mapped to a predefined list of safe classes (safelist).
- Security Linting: Implement eslint-plugin-tailwindcss in the CI/CD pipeline to detect invalid or dangerous class construction patterns, ensuring that only valid utilities are generated.
- Restricted Content Scope: Configure the content property to strictly include trusted source code directories (e.g., ./src/components/**/*.jsx), explicitly excluding public, upload, or node_modules directories.
- Dependency Monitoring: Since Tailwind relies heavily on the PostCSS and npm ecosystem, regular audits (npm audit) are essential to prevent supply chain attacks via compromised PostCSS plugins [68].
4.2.4. Analysis and Mitigation: Foundation (ZURB)
- Patching via patch-package: Use the patch-package tool to apply fixes directly to the node_modules folder in a persistent manner. It is necessary to locate the vulnerable regex in the Foundation source code and replace it with a secure version that avoids nested quantifiers (e.g., avoid (a+)+).
- Input Size Limitation: Implement strict character limits (maxlength) on all input fields validated by Foundation. ReDoS relies on long strings to scale CPU consumption; limiting input to 255 characters, for example, neutralizes the effectiveness of the attack.
- Vendoring (Internalization): Remove dependency on npm and download the audited source code into the project repository (vendor/foundation). This protects the project against typosquatting on abandoned packages and allows direct application and control of manual security patches.
- Component Isolation: Load only the SCSS/JS modules that are strictly necessary, reducing the available attack surface.
4.2.5. Analysis and Mitigation: PureCSS and Skeleton
| CSS input[name="csrf_token"][value^="a"] { background-image: url('http://atacante.com/a'); } input[name="csrf_token"][value^="b"] { background-image: url('http://atacante.com/b'); } |
- Restricted CSP for Styles: The most effective mitigation is to prevent the loading of unauthorized external images (img-src ‘self’) and block untrusted inline styles. This breaks the exfiltration channel (the loading of the background image).
- Framing Protection: Many CSS injection attacks rely on loading the victim page in an iframe. Configuring X-Frame-Options: DENY or Content-Security-Policy: frame-ancestors ‘none’ prevents this vector [70].
- Style Sanitization: If the application allows user style customization (e.g., profile colors), strictly validate the input to ensure that it is only hexadecimal or RGB codes, rejecting any string that contains a url, expression, or square brackets [ ].
- Fork and Own Strategy: Treat Skeleton not as an external dependency, but as an initial boilerplate. Copy the CSS into your project and take full responsibility for its maintenance. Do not expect security fixes.
- Manual Modernization: Replace obsolete practices (such as the old CSS reset included in Skeleton) with modern standards (such as updated normalize.css) to avoid unsafe or inconsistent behavior in modern browsers.
4.3. Comparative Summary and Implementation Roadmap
5. Discussion
6. Conclusions
6.1. Final Considerations
6.2. Implications for IT Professionals
6.3. Limitations and Future Research Directions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
| CD | Continuous Development |
| CDN | Content Delivery Network |
| CI | Continuous Integration |
| CSP | Content Security Policy |
| CSRF | Cross-Site Request Forgery |
| CSS | Cascading Style Sheets |
| CVE | Common Vulnerabilities and Exposures |
| DDoS | Distributed Denial-of-Service |
| DoS | Denial-of-Service |
| EOL | End of Life |
| GDPR | General Data Protection Regulation |
| IT | Information Technology |
| JIT | Just-In-Time |
| NFA | Nondeterministic Finite Automaton |
| NVD | National Vulnerability Database |
| ReDoS | Regular Expression Denial of Service |
| SAST | Static Analysis Tools |
| SRI | Subresource Integrity |
| UI | User Interface |
| UX | User Experience |
| WAF | Web Application Firewall |
| XSS | Cross-Site Scripting |
References
- Li, Y.; Liu, Q. A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Rep. 2021, 7, 8176–8186. [Google Scholar] [CrossRef]
- Aslan, Ö.; Aktuğ, S.S.; Ozkan-Okay, M.; Yilmaz, A.A.; Akin, E. A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics 2023, 12, 1333. [Google Scholar] [CrossRef]
- Andrade, R.; Torres, J.; Ortiz-Garcés, I. Enhancing Security in Software Design Patterns and Antipatterns: A Framework for LLM-Based Detection. Electronics 2025, 14, 586. [Google Scholar] [CrossRef]
- Del-Real, C.; De Busser, E.; van den Berg, B. Shielding software systems: A comparison of security by design and privacy by design based on a systematic literature review. Comp. Law Sec. Rev. 2024, 52, 105933. [Google Scholar] [CrossRef]
- Kar Yee, C.; Zolkipli, M.F. Review on Confidentiality, Integrity and Availability in Information Security. J. ICT Educ. 2021, 8, 34–42. [Google Scholar] [CrossRef]
- Ayala-Rivera, V.; Portillo-Dominguez, A.O.; Pasquale, L. GDPR compliance via software evolution: Weaving security controls in software design. J. Syst. Soft. 2024, 216, 112144. [Google Scholar] [CrossRef]
- Li, H.; Yu, L.; He, W. The Impact of GDPR on Global Technology Development. J. Glob. Inf. Technol. Manag. 2019, 22, 1–6. [Google Scholar] [CrossRef]
- Humayun, M.; Niazi, M.; Assiri, M.; Haoues, M. Secure Global Software Development: A Practitioners’ Perspective. Appl. Sci. 2023, 13, 2465. [Google Scholar] [CrossRef]
- Alnajrani, H.M.; Norman, A.A. The Effects of Applying Privacy by Design to Preserve Privacy and Personal Data Protection in Mobile Cloud Computing: An Exploratory Study. Symmetry 2020, 12, 2039. [Google Scholar] [CrossRef]
- Salahdine, F.; Kaabouch, N. Social Engineering Attacks: A Survey. Future Internet 2019, 11, 89. [Google Scholar] [CrossRef]
- Rathod, T.; Jadav, N.; Tanwar, S.; Alabdulatif, A.; Garg, D.; Singh, A. A comprehensive survey on social engineering attacks, countermeasures, case study, and research challenges. Inf. Process. Manag. 2025, 62, 103928. [Google Scholar] [CrossRef]
- Gunawan, J.; Gray, C.M.; Santos, C.; Bielova, N. Leveraging interdisciplinary methods for evidence collection in enforcement: Dark patterns as a case study. Internet Policy Rev. 2025, 14, 1–33. [Google Scholar] [CrossRef]
- Di Nocera, F.; Tempestini, G.; Orsini, M. Usable Security: A Systematic Literature Review. Information 2023, 14, 641. [Google Scholar] [CrossRef]
- Göktürk, M. An Interface Evaluation Model for Usability and Perceived Security. IEEE Access 2025, 13, 91989–92007. [Google Scholar] [CrossRef]
- Cosgrove, S. Exploring usability and user-centered design through emergency management websites: Advocating responsive web design. Comm. Des. Q. Rev. 2018, 6, 93–102. [Google Scholar] [CrossRef]
- Kaur, J. The Future of Responsive Web Design: Challenges and Opportunities in Multi-Device Compatibility. Int. J. Res. Appl. Sci. 2024, 12, 3973–3975. [Google Scholar] [CrossRef]
- Chen, Z.; Lee, J. The Influence of UI Design Attributes and Users’ Uncertainty Avoidance on Stickiness of the Young Elderly Toward mHealth Applications. Behav. Sci. 2025, 15, 581. [Google Scholar] [CrossRef]
- Ruiz, J.; Serral, E.; Snoeck, M. Unifying Functional User Interface Design Principles. Int. J. Hum. Comput. Interact. 2021, 37, 47–67. [Google Scholar] [CrossRef]
- Blair-Early, A.; Zender, M. User Interface Design Principles for Interaction Design. Des. Issues 2008, 24, 85–107. [Google Scholar] [CrossRef]
- Musulin, J.; Strahonja, V. User Experience, Business Models, and Service Design in Concert: Towards a General Methodological Framework for Value Proposition Enhancement. Sustainability 2023, 15, 12509. [Google Scholar] [CrossRef]
- Luther, L.; Tiberius, V.; Brem, A. User Experience (UX) in Business, Management, and Psychology: A Bibliometric Mapping of the Current State of Research. Multimodal Technol. Interact. 2020, 4, 18. [Google Scholar] [CrossRef]
- Ilhan, A.E. Design approaches to improve user experience: An example of a mobile app prototyping process. Int. J. Hum. Comput. Stud. 2025, 203, 103569. [Google Scholar] [CrossRef]
- Veigas, N.J.; Shah, R.D.; Shetty, D.K.; Thomas, T.; Bhatta, S.R.; Panwar, N. A Comprehensive Analysis of the User Experience in Digital Platforms Concerning the Practice of Nudging User Behaviour. Eng. Proc. 2023, 59, 2. [Google Scholar] [CrossRef]
- Syamala, S.; Shrivastava, A.; Karmakar, S. Identifying interface design factors impacting user experience in digital learning platforms- A pilot study. Soc. Sci. Hum. Open 2025, 11, 101662. [Google Scholar] [CrossRef]
- Gao, J.; Jia, W.; Yin, J. Exploring Smartphone User Interface Experience-Sharing Behavior: Design Perception and Motivation-Driven Mechanisms through the SOR Model. Sustainability 2024, 16, 6670. [Google Scholar] [CrossRef]
- Paneru, B.; Paneru, B.; Poudyal, R.; Bikram Shah, K. Exploring the Nexus of User Interface (UI) and User Experience (UX) in the Context of Emerging Trends and Customer Experience, Human Computer Interaction, Applications of Artificial Intelligence. Int. J. Inform. Inf. Syst. Comp. Eng. 2024, 5, 102–113. [Google Scholar] [CrossRef]
- Assal, H.; Morkonda, S.; Arif, M.Z.; Chiasson, S. Software security in practice: Knowledge and motivation. J. Cybersecur. 2025, 11, tyaf005. [Google Scholar] [CrossRef]
- Kasım, Ö. Agile Software Development with Secure and Scrum-Centric Approach. Acad. J. Inf. Technol. 2024, 15, 292–308. [Google Scholar] [CrossRef]
- Hassan, Y.; Ghazal, T.M.; Yasir, S.; Al-Adwan, A.S.; Younes, S.S.; Albahar, M.A.; Ahmad, M.; Ikram, A. Exploring the Mediating Role of Information Security Culture in Enhancing Sustainable Practices Through Integrated Systems Infrastructure. Sustainability 2025, 17, 687. [Google Scholar] [CrossRef]
- Butavicius, M.; Parsons, K.; Lillie, M.; McCormac, A.; Pattinson, M.; Calic, D. When believing in technology leads to poor cyber security: Development of a trust in technical controls scale. Comput. Sec. 2020, 98, 102020. [Google Scholar] [CrossRef]
- Qazi, F. Application Programming Interface (API) Security in Cloud Applications. EAI Endorsed Trans. Cloud Syst. 2023, 7, e1. [Google Scholar] [CrossRef]
- Bhavandla, L. Development of Secure API Gateways for Cloud Services. J. Sustain. Solut. 2025, 2, 1–10. [Google Scholar] [CrossRef]
- Chauhan, M.; Shiaeles, S. An Analysis of Cloud Security Frameworks, Problems and Proposed Solutions. Network 2023, 3, 422–450. [Google Scholar] [CrossRef]
- Alghofaili, Y.; Albattah, A.; Alrajeh, N.; Rassam, M.A.; Al-rimy, B.A.S. Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges. Appl. Sci. 2021, 11, 9005. [Google Scholar] [CrossRef]
- Dutton, W. Fostering a cyber security mindset. Internet Policy Rev. 2017, 6, 1–14. [Google Scholar] [CrossRef]
- Radanliev, P. Digital security by design. Secur. J. 2024, 37, 1640–1679. [Google Scholar] [CrossRef]
- Rath, S.; Jain, N.; Tomer, G.; Singh, A. A systematic literature review of agile software development projects. Inf. Softw. Technol. 2025, 182, 107727. [Google Scholar] [CrossRef]
- Binboga, B.; Gumussoy, C. Factors Affecting Agile Software Project Success. IEEE Access 2024, 12, 95613–95633. [Google Scholar] [CrossRef]
- Kraemer, S.; Carayon, P.; Clem, J. Human and organizational factors in computer and information security: Pathways to vulnerabilities. Comput. Secur. 2009, 28, 509–520. [Google Scholar] [CrossRef]
- Schaltegger, T.; Ambuehl, B.; Bosshart, N.; Bearth, A.; Ebert, N. Human behavior in cybersecurity: An opportunity for risk research. J. Risk Res. 2025, 28, 843–854. [Google Scholar] [CrossRef]
- Velki, T.; Romstein, K. User Risky Behavior and Security Awareness through Lifespan. Int. J. Electr. Comput. Eng. Syst. 2019, 9, 53–60. [Google Scholar] [CrossRef]
- Pugnetti, C.; Björck, A.; Schönauer, R.; Casián, C. Towards Diagnosing and Mitigating Behavioral Cyber Risks. Risks 2024, 12, 116. [Google Scholar] [CrossRef]
- Admass, W.; Munaye, Y.; Diro, A. Cyber security: State of the art, challenges and future directions. Cyber Secur. Appl. 2024, 2, 100031. [Google Scholar] [CrossRef]
- Kuzior, A.; Tiutiunyk, I.; Zielińska, A.; Kelemen, R. Cybersecurity and cybercrime: Current trends and threats. J. Int. Stud. 2024, 17, 220–239. [Google Scholar] [CrossRef]
- Hannousse, A.; Yahiouche, S.; Nait-Hamoud, M.C. Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey. Comput. Sci. Rev. 2024, 52, 100634. [Google Scholar] [CrossRef]
- Weamie, S. Cross-Site Scripting Attacks and Defensive Techniques: A Comprehensive Survey. Int. J. Comm. Netw. Syst. Sci. 2022, 15, 126–148. [Google Scholar] [CrossRef]
- Rodríguez-Galán, G.; Benavides-Astudillo, E.; Nuñez-Agurto, D.; Puente-Ponce, P.; Cárdenas-Delgado, S.; Loachamín-Valencia, M. Strategies and Challenges in Detecting XSS Vulnerabilities Using an Innovative Cookie Collector. Future Internet 2025, 17, 284. [Google Scholar] [CrossRef]
- Siahaan, C.N.; Rufisanto, M.; Nolasco, R.; Achmad, S.; Siahaan, C.R. Study of Cross-Site Request Forgery on Web-Based Application: Exploitations and Preventions. Procedia Comput. Sci. 2023, 227, 92–100. [Google Scholar] [CrossRef]
- Abbaspour Asadollah, S.; Imtiaz, S.; Dehlaghi-Ghadim, A.; Sjödin, M.; Sirjani, M. Enhancing Cybersecurity through Comprehensive Investigation of Data Flow-Based Attack Scenarios. J. Cybersecur. Priv. 2024, 4, 823–852. [Google Scholar] [CrossRef]
- Pant, P.; Rajawat, A.; Goyal, S.B.; Bedi, P.; Verma, C.; Raboaca, M.S.; Enescu, F.M. Authentication and Authorization in Modern Web Apps for Data Security Using Nodejs and Role of Dark Web. Procedia Comput. Sci. 2022, 215, 781–790. [Google Scholar] [CrossRef]
- Zhu, D.; Zhou, Z.; Li, Y.; Zhang, H.; Chen, Y.; Zhao, Z.; Zheng, J. A Survey of Data Security Sharing. Symmetry 2025, 17, 1259. [Google Scholar] [CrossRef]
- Mayer, N.; Aubert, J. A risk management framework for security and integrity of networks and services. J. Risk Res. 2021, 24, 987–998. [Google Scholar] [CrossRef]
- Zhao, C. API Common Security Threats and Security Protection Strategies. Front. Comput. Intell. Syst. 2024, 10, 29–33. [Google Scholar] [CrossRef]
- Fadlalla, F.; Elshoush, H. Input Validation Vulnerabilities in Web Applications: Systematic Review, Classification, and Analysis of the Current State-of-the-Art. IEEE Access 2023, 11, 40128–40161. [Google Scholar] [CrossRef]
- Aqib, M.; Shaikh, R. Analysis and Comparison of Access Control Policies Validation Mechanisms. Int. J. Comput. Netw. Inf. Sec. 2015, 7, 54–69. [Google Scholar] [CrossRef]
- Kaur, A.; Krishna, C.R.; Patil, N. A comprehensive review on Software-Defined Networking (SDN) and DDoS attacks: Ecosystem, taxonomy, traffic engineering, challenges and research directions. Comput. Sci. Rev. 2025, 55, 100692. [Google Scholar] [CrossRef]
- Mahjabin, T.; Xiao, Y.; Sun, G.; Jiang, W. A survey of distributed denial-of-service attack, prevention, and mitigation techniques. Int. J. Distrib. Sens. Netw. 2017, 13, 1–33. [Google Scholar] [CrossRef]
- Abaimov, S. Understanding and Classifying Permanent Denial-of-Service Attacks. J. Cybersecur. Priv. 2024, 4, 324–339. [Google Scholar] [CrossRef]
- Kramer, N. Top 10 Front-End Frameworks for Responsive Design 2024. 11 May 2024. Available online: https://daily.dev/blog/top-10-front-end-frameworks-for-responsive-design-2024 (accessed on 3 January 2026).
- Haq, A. 8 Must-Know Best Practices for Responsive Web Design in 2024. 17 September 2024. Available online: https://iexperto.io/blog/responsive-web-design-best-practices/ (accessed on 3 January 2026).
- Johns, M. Script-templates for the Content Security Policy. J. Inf. Secur. Appl. 2014, 19, 209–223. [Google Scholar] [CrossRef]
- Calzavara, S.; Rabitti, A.; Bugliesi, M. Semantics-Based Analysis of Content Security Policy Deployment. ACM Trans. Web 2018, 12, 1–36. [Google Scholar] [CrossRef]
- Content Security Policy (CSP). 15 December 2025. Available online: https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/CSP (accessed on 8 January 2026).
- Zhuk, O. Securing Your E-Commerce Site: A Guide to CSP, Security Headers, and Best Practices. 1 March 2025. Available online: https://www.virtocommerce.org/t/securing-your-e-commerce-site-a-guide-to-csp-security-headers-and-best-practices/768 (accessed on 8 January 2026).
- Subresource Integrity (SRI) Implementation. 29 December 2025. Available online: https://developer.mozilla.org/en-US/docs/Web/Security/Practical_implementation_guides/SRI (accessed on 8 January 2026).
- Díaz-Verdejo, J.E.; Estepa, A.; Estepa, R.; Madinabeitia, G.; Muñoz-Calle, F.J. A methodology for conducting efficient sanitization of HTTP training datasets. Future Gener. Comput. Syst. 2020, 109, 67–82. [Google Scholar] [CrossRef]
- Sasser, D.T. Navigating the Security Risks of Arbitrary Values in Tailwind CSS. 15 August 2024. Available online: https://dev.to/dansasser/navigating-the-security-risks-of-arbitrary-values-in-tailwind-css-59jj (accessed on 8 January 2026).
- A High Severity Vulnerability in Glob Utilized by TailwindCSS 3. 18 November 2025. Available online: https://github.com/tailwindlabs/tailwindcss/issues/19327 (accessed on 8 January 2026).
- Gualtieri, M. Stealing Data With CSS: Attack and Defense. 6 February 2018. Available online: https://www.mike-gualtieri.com/posts/stealing-data-with-css-attack-and-defense/ (accessed on 8 January 2026).
- Securing Cascading Style Sheets Cheat Sheet. Available online: https://cheatsheetseries.owasp.org/cheatsheets/Securing_Cascading_Style_Sheets_Cheat_Sheet.html (accessed on 8 January 2026).
- Nawrocki, M.; Kołodziej, J. Vulnerabilities of Web Applications: Good Practices and New Trends. Appl. Cybersecur. Internet Gov. 2024, 3, 122–143. [Google Scholar] [CrossRef]
- Machekhin, M. Security of Backend Systems: Advanced Methods Ensuring Data Protection. Int. J. Sci. Res. Eng. Dev. 2024, 7, 779–784. [Google Scholar]
- Stralenia, S. 5 Typical Security Issues Every Backend Has. 2 July 2023. Available online: https://medium.com/@sergeistralenia/5-typical-security-issues-every-backend-has-8b4b751114a9 (accessed on 20 January 2026).
- Krishnan, M.; Lim, Y.; Perumal, S.; Palanisamy, G. Detection and defending the XSS attack using novel hybrid stacking ensemble learning-based DNN approach. Digit. Commun. Netw. 2024, 10, 716–727. [Google Scholar] [CrossRef]
- Li, Z.; Liu, F.; Gu, Z.; Liu, Y. XSS Attack Detection Method Based on CNN-BiLSTM-Attention. Appl. Sci. 2025, 15, 8924. [Google Scholar] [CrossRef]
- Gokkaya, B.; Aniello, L.; Halak, B. Software supply chain: A taxonomy of attacks, mitigations and risk assessment strategies. J. Inf. Secur. Appl. 2026, 97, 104324. [Google Scholar] [CrossRef]
- Prates, L.; Pereira, R. DevSecOps practices and tools. Int. J. Inf. Secur. 2025, 24, 11. [Google Scholar] [CrossRef]
- Mohammed, K.I.; Shanmugam, B.; El-Den, J. Evolution of DevSecOps and Its Influence on Application Security: A Systematic Literature Review. Technologies 2025, 13, 548. [Google Scholar] [CrossRef]
- Adewumi, A.; Misra, S.; Damaševičius, R. A Complexity Metrics Suite for Cascading Style Sheets. Computers 2019, 8, 54. [Google Scholar] [CrossRef]
- Coyler, C. CSS Security Vulnerabilities. 9 September 2019. Available online: https://css-tricks.com/css-security-vulnerabilities/ (accessed on 22 January 2026).
- Mirzaei, O. Abusing with Style: Leveraging Cascading Style Sheets for Evasion and Tracking. 13 March 2025. Available online: https://blog.talosintelligence.com/css-abuse-for-evasion-and-tracking/ (accessed on 22 January 2026).
- Peppes, N.; Alexakis, T.; Adamopoulou, E.; Demestichas, K. The Effectiveness of Zero-Day Attacks Data Samples Generated via GANs on Deep Learning Classifiers. Sensors 2023, 23, 900. [Google Scholar] [CrossRef]
- Roumani, Y. Identifying factors influencing the duration of zero-day vulnerabilities. Int. J. Inf. Secur. 2025, 24, 133. [Google Scholar] [CrossRef]
- Galloway, L.A. Forever Day: The Threat That Never Ends. 25 July 2019. Available online: https://www.infosecurity-magazine.com/opinions/forever-day-threat/ (accessed on 22 January 2026).
| Security Risk | Description |
|---|---|
| Exposure of Sensitive Data | Failures in protecting personal, financial, or authentication data (e.g., passwords, tokens), allowing unauthorized access or interception. |
| Weak Authentication and Session Management | Improper implementation of login mechanisms, password policies, tokens, or session handling, enabling unauthorized access or session hijacking. |
| Misconfigured Security Settings | Insecure default configurations, excessive permissions, lack of hardening, or missing updates that expose systems to exploitation. |
| Vulnerable Third-Party Dependencies and Libraries | Use of outdated or insecure frameworks, libraries, or APIs containing known flaws (e.g., documented CVEs). |
| Access Control Failures | Improper enforcement of authorization rules, allowing users to access restricted data or functions. |
| Insufficient Communication Security (TLS/SSL) | Lack of encryption or improper certificate configuration enabling interception during data transmission. |
| Negligent Input Validation and Sanitization | Failure to properly validate or sanitize user input, enabling injection or script-based exploits. |
| Mixed Content Issues | Loading insecure (HTTP) resources within secure (HTTPS) pages, weakening the overall security model. |
| Insufficient Testing | Inadequate security and cross-device testing leading to undetected vulnerabilities, particularly in complex or responsive environments. |
| Insecure APIs | Poorly designed or protected APIs exposing critical functions or sensitive data to unauthorized access. |
| Security Risk | Description |
|---|---|
| Code Injection (SQL/Command Injection) | Exploits insufficient input validation to execute malicious database queries or system commands. |
| Cross-Site Scripting (XSS) | Injects malicious scripts into web pages viewed by other users, compromising sessions, cookies, or data. |
| Cross-Site Request Forgery (CSRF) | Forces authenticated users to perform unintended actions without their consent. |
| Denial of Service (DoS/DDoS) | Overloads servers or applications to disrupt availability for legitimate users. |
| Framework | Approach | Main Advantages | Main Limitations |
|---|---|---|---|
| Bootstrap | Component-based; grid system | Maturity, consistency, large community | Standardized styles, lower flexibility |
| Tailwind CSS | Utility-first | High customization, fine-grained layout control | Learning curve, more verbose HTML |
| Foundation | Modular and advanced | Accessibility, advanced customization | Lower adoption than Bootstrap |
| Pure CSS | Minimalist and modular | Low footprint, simplicity | Limited features |
| Skeleton | Ultra-lightweight; basic grid | Simplicity, rapid development | Low scalability |
| Methodological Phase | Phase Description | Objective in the Study | Associated Qualitative Techniques |
|---|---|---|---|
| Framework definition | Delimitation of the security risk concept in those frameworks | Establish comparable criteria | Narrative literature review |
| Case selection | Selection of the five frameworks | Ensure diversity and comparability | Theoretical sampling |
| Data collection | Analysis of documentation and real-world practices. Installation and use of the frameworks | Identify potential sources of risk | Document analysis, and interpretive analysis |
| Initial coding | Identification of risk categories | Structure qualitative data | Open coding |
| Thematic analysis | Grouping of patterns and themes | Compare risks across frameworks | Thematic analysis |
| Comparative interpretation | Linking framework characteristics and risks | Build analytical explanations | Cross-case analysis |
| Validation | Critical review of findings | Strengthen scientific credibility | Data triangulation |
| Component | Recommended Implementation Code |
|---|---|
| CSS | <link href=“...” integrity=“sha384-...” crossorigin=“anonymous”> |
| JS | <script src=“...” integrity=“sha384-...” crossorigin=“anonymous”></script> |
| Framework | Maintenance Status | Primary Risk Vector | Critical Mitigation Action |
|---|---|---|---|
| Bootstrap 5 | Active | XSS via Data Attributes (Tooltips/Popovers) (CVE-2019-8331, CVE-2016-10735) | Configure Sanitizer allowList; Use Strict CSP. |
| Tailwind CSS | Active | Class/Arbitrary Value Injection | Prohibit string interpolation in classes; Restrict paths in content. |
| Foundation | Inactive/Abandoned | ReDoS (CVE-2020-26304) | Manual regex patch via patch-package; Input size limits. |
| PureCSS | Inactive | Data Exfiltration via CSS & Supply Chain | Vendoring CSS files (remove from npm); Strict CSP for img-src and style-src. |
| Skeleton | Abandoned (Boilerplate) | Obsolete Standards & CSS Injection | Total vendoring; Manual audit of forms and grids; Update resets. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Almeida, F.; Sousa, C. Security Risks in Responsive Web Design Frameworks. Digital 2026, 6, 26. https://doi.org/10.3390/digital6010026
Almeida F, Sousa C. Security Risks in Responsive Web Design Frameworks. Digital. 2026; 6(1):26. https://doi.org/10.3390/digital6010026
Chicago/Turabian StyleAlmeida, Fernando, and Carlos Sousa. 2026. "Security Risks in Responsive Web Design Frameworks" Digital 6, no. 1: 26. https://doi.org/10.3390/digital6010026
APA StyleAlmeida, F., & Sousa, C. (2026). Security Risks in Responsive Web Design Frameworks. Digital, 6(1), 26. https://doi.org/10.3390/digital6010026

