Chrome 140 introduces HTTP cookie prefix to combat client-side security threats
Chrome 140 beta introduces __Http and __HostHttp cookie prefixes on August 6, 2025, enabling servers to distinguish server-set from client-set cookies.

Chrome 140 beta, released on August 6, 2025, introduces new HTTP cookie prefixes that provide servers with enhanced capabilities to distinguish between cookies set by server responses and those potentially injected by client-side scripts. According to the Chrome for Developers blog, the __Http and __HostHttp prefixes represent a significant advancement in web security protocols designed to combat cross-site scripting attacks and malicious browser extensions.
Subscribe the PPC Land newsletter ✉️ for similar stories like this one. Receive the news every day in your inbox. Free of ads. 10 USD per year.
The new cookie prefix functionality addresses critical security vulnerabilities that have plagued web applications for years. When cookies are normally set by server responses through Set-Cookie headers, unexpected client-side code including XSS exploits, malicious extensions, or compromised developer commits can potentially override these values through JavaScript. This capability creates substantial security risks for applications that rely on server-controlled cookie values for authentication, session management, and security policies.
The __Http prefix establishes strict requirements for cookie attributes. Cookies beginning with this case-sensitive string must include both Secure and HttpOnly attributes when set through Set-Cookie headers. This combination ensures the cookie remains inaccessible to JavaScript while requiring secure HTTPS transmission. The prefix provides developers and server operators with confidence that any cookie bearing this prefix originated from server-side Set-Cookie headers rather than client-side JavaScript execution.
Building upon the __Http foundation, the __HostHttp prefix incorporates additional security constraints. Cookies using this prefix must satisfy all __Http requirements while adding Path attribute restrictions set to "/" and prohibiting Domain attributes entirely. This configuration creates host-only cookies that cannot span subdomains and remain effective across the entire host without path-specific overrides. The combination yields cookies that adhere closely to origin-based security boundaries while providing server operators with definitive client-side isolation guarantees.
According to the HTTP Working Group documentation, these prefixes emerged from ongoing discussions within the IETF standards community. The httpwg/http-extensions repository shows that the feature underwent extensive technical review before implementation. The specification defines precise compatibility requirements that browsers must enforce during cookie parsing and validation processes.
When Chrome encounters cookies with __Http prefixes, the browser validates that the secure flag equals true and the http-only flag equals true. For __HostHttp prefixes, additional validation ensures host-only status, explicit path attribute presence, and path value restrictions. Cookies failing these compatibility checks face rejection during the parsing process, preventing their storage or transmission to servers.
The security implications extend beyond simple cookie management. By providing servers with reliable mechanisms to detect client-side cookie injection, the prefixes enable more robust defense strategies against sophisticated attacks. Web applications can implement server-side logic that treats the presence of __Http or __HostHttp prefixed cookies as authoritative indicators of server-originated values, potentially triggering security responses when unexpected values appear.
Mozilla's standards-positions repository indicates browser vendor coordination on the feature implementation. The discussion thread reveals that Firefox landed support for the prefixes in July 2025 through Bugzilla entry 1974979. This cross-browser implementation ensures consistent behavior across major web browsers, reducing fragmentation concerns for web developers implementing security-sensitive applications.
The timing of Chrome 140's release coincides with broader industry shifts toward enhanced privacy and security measures. PPC Land has extensively covered Chrome's ongoing third-party cookie deprecation efforts, which create new challenges for advertisers and publishers relying on traditional tracking methods. While the HTTP cookie prefixes serve different security purposes than privacy-focused cookie restrictions, both initiatives reflect Chrome's commitment to strengthening web security architecture.
Marketing professionals should understand these changes within the context of evolving browser security models. The recent DuckDuckGo browser redesign demonstrates how privacy-focused alternatives continue gaining adoption among security-conscious users. The HTTP cookie prefix implementation represents another step in browsers' evolution toward more restrictive security policies that may impact advertising measurement and user tracking capabilities.
Technical implementation requires careful planning for organizations managing authentication systems and session handling. Developers must evaluate existing cookie strategies to determine where server-side guarantees provide value. Applications handling sensitive data or requiring strong session integrity may benefit from migrating critical cookies to use the new prefixes, particularly for authentication tokens and security-sensitive configuration values.
The feature's availability in Chrome 140 beta provides development teams with testing opportunities before widespread deployment. Beta channel access enables organizations to validate compatibility with existing systems and identify potential integration challenges. Chrome 140 beta became available through the official Chrome website for desktop platforms and Google Play Store for Android devices starting August 6, 2025.
Enterprise environments should consider the security benefits alongside potential compatibility concerns. Legacy applications that rely on client-side cookie modification for legitimate purposes may require updates to work with the new prefix restrictions. However, most modern web applications should experience minimal impact since the prefixes specifically target scenarios where client-side cookie access poses security risks.
The broader implications extend to the advertising technology ecosystem that relies heavily on cookie-based tracking and measurement. Previous coverage on PPC Land highlighted how browser security enhancements affect digital marketing capabilities. While HTTP cookie prefixes primarily address security rather than privacy concerns, they represent another evolution in browser behavior that advertising technology providers must accommodate.
Industry experts note the strategic importance of server-side security guarantees in an environment where client-side threats continue evolving. As web applications become more complex and sophisticated attacks target browser-based vulnerabilities, mechanisms like HTTP cookie prefixes provide fundamental building blocks for defensive strategies. The prefixes complement existing security measures including Content Security Policy headers, Subresource Integrity, and cross-origin isolation features.
Looking ahead, the success of HTTP cookie prefix adoption will depend on developer awareness and implementation patterns. Unlike some browser security features that operate transparently, cookie prefixes require explicit adoption by web application developers. Educational efforts and documentation will prove crucial for maximizing the security benefits these prefixes can provide.
The Chrome 140 beta release represents a milestone in the ongoing evolution of web security standards. By providing servers with reliable mechanisms to distinguish between server-set and client-set cookies, the HTTP cookie prefixes address fundamental vulnerabilities that have existed since the early days of web development. As browsers continue strengthening security models, features like these prefixes will likely become standard components of robust web application security architectures.
Subscribe the PPC Land newsletter ✉️ for similar stories like this one. Receive the news every day in your inbox. Free of ads. 10 USD per year.
Timeline
- February 2024: Privacy legislation discussions intensify with California AB 3048 introduction
- April 2024: Third-party cookie deprecation timeline pushed to early 2025
- June 27, 2024: HTTP Working Group merges cookie layering specification with __Http prefix support
- July 2024: Safari unveils Private Browsing 2.0 with enhanced security
- July 2025: Firefox implements HTTP cookie prefix support through Mozilla Bugzilla
- July 22, 2025: DuckDuckGo browser redesign emphasizes privacy interface
- August 6, 2025: Chrome 140 beta launches with __Http and __HostHttp cookie prefix support
- September 2024: California Governor vetoes AB 3048 privacy bill
Subscribe the PPC Land newsletter ✉️ for similar stories like this one. Receive the news every day in your inbox. Free of ads. 10 USD per year.
PPC Land explains
HTTP Cookie Prefixes: Specialized naming conventions that browsers enforce to guarantee specific security properties for cookies. The __Http and __HostHttp prefixes introduced in Chrome 140 create contractual agreements between servers and browsers, ensuring that cookies bearing these prefixes can only be set through server-side Set-Cookie headers rather than client-side JavaScript. This mechanism provides servers with reliable indicators of cookie origin, enabling more robust security policies and attack detection capabilities.
Set-Cookie Headers: Server-side HTTP response headers that instruct browsers to store cookies with specified attributes and values. Unlike client-side JavaScript cookie manipulation through document.cookie, Set-Cookie headers represent the authoritative server-controlled method for cookie establishment. The new HTTP cookie prefixes specifically validate that cookies were created through this server-side mechanism rather than potentially malicious client-side scripts.
Cross-Site Scripting (XSS): A class of web security vulnerabilities where attackers inject malicious scripts into trusted websites, potentially allowing unauthorized access to cookies, session tokens, and other sensitive data. The HTTP cookie prefixes help mitigate XSS impact by ensuring that security-critical cookies cannot be overwritten or modified by injected JavaScript code, maintaining the integrity of server-controlled authentication and session management systems.
Client-Side Scripts: JavaScript code that executes within web browsers, including both legitimate application functionality and potentially malicious code from XSS attacks, compromised browser extensions, or developer errors. The distinction between server-side and client-side cookie setting becomes crucial for security, as client-side scripts can manipulate cookies in ways that may compromise application security assumptions about cookie origin and integrity.
Security Attributes: Specific cookie properties that browsers enforce to enhance protection against various attack vectors. The Secure attribute ensures cookies are only transmitted over HTTPS connections, while HttpOnly prevents JavaScript access to cookie values. The new HTTP cookie prefixes mandate these attributes, creating standardized security baselines for cookies that require server-side origin guarantees.
Chrome 140 Beta: The testing version of Google Chrome released on August 6, 2025, containing experimental features before general availability. Beta releases enable developers and organizations to test compatibility with upcoming browser changes, including security enhancements like HTTP cookie prefixes. This testing phase proves critical for identifying integration challenges and ensuring smooth transitions when features reach stable release channels.
Server-Side Validation: The process by which web servers verify and enforce security policies for incoming requests and stored data. With HTTP cookie prefixes, servers gain enhanced capabilities to validate cookie authenticity, potentially implementing additional security checks when cookies bearing specific prefixes appear with unexpected values or missing required attributes, enabling more sophisticated attack detection and response mechanisms.
Browser Security Models: Comprehensive frameworks that define how web browsers protect users and websites from various security threats. Modern browser security models encompass same-origin policy enforcement, content security policies, cookie security attributes, and emerging features like HTTP cookie prefixes. These models continue evolving to address new attack vectors while maintaining backward compatibility with existing web applications.
Authentication Systems: Technologies and processes that verify user identities and manage access to protected resources. HTTP cookie prefixes provide authentication systems with stronger guarantees about cookie integrity, reducing risks of session hijacking, token manipulation, and other authentication bypass attacks. This enhancement proves particularly valuable for applications handling sensitive data or requiring robust security assurances.
Web Application Security: The practice of protecting web-based software from threats including data breaches, unauthorized access, and malicious attacks. HTTP cookie prefixes represent one component of comprehensive web application security strategies, complementing existing measures like input validation, output encoding, access controls, and secure communication protocols. Organizations must integrate these new browser capabilities into broader security architectures for maximum effectiveness.
Subscribe the PPC Land newsletter ✉️ for similar stories like this one. Receive the news every day in your inbox. Free of ads. 10 USD per year.
Summary
Who: Google Chrome development team introduced HTTP cookie prefixes affecting web developers, security professionals, and organizations managing authentication systems.
What: Chrome 140 beta adds __Http and __HostHttp cookie prefixes that enable servers to distinguish between server-set cookies and client-set cookies, providing enhanced security against XSS attacks and malicious browser extensions.
When: Chrome 140 beta became available on August 6, 2025, with the feature built upon HTTP Working Group specifications merged in June 2024.
Where: The feature affects all Chrome 140 beta installations across Android, ChromeOS, Linux, macOS, and Windows platforms, with broader implementation across web servers worldwide.
Why: The prefixes address critical security vulnerabilities where unexpected client-side code can override server-controlled cookies, providing developers with reliable mechanisms to detect and prevent cookie injection attacks while maintaining origin-based security boundaries.