Wistia Embedded Videos SDK

CSP for Wistia Embedded Videos SDK

CDN
utilities
Add Package to Your CSP

Using Wistia Embedded Videos SDK with Content Security Policy

Wistia is serves companies' videos on their websites for marketing, support, and sales. Their Content-Security-Policy is quite hard to tackle without the RapidSec package, as it's not well documented.

Allow these directives in your CSP, to support Wistia Embedded Videos SDK in your Content Security Policy:

script-src
  https://*.wistia.com
  https://src.litix.io;
style-src
  'unsafe-inline';
object-src
  embedwistia-a.akamaihd.net;
frame-src
  *.wistia.com
  *.wistia.net;
child-src
  *.wistia.com
  *.wistia.net;
img-src
  data:
  embedwistia-a.akamaihd.net
  *.wistia.com
  *.wistia.net;
font-src
  data:
  *.wistia.com;
connect-src
  *.wistia.com
  embedwistia-a.akamaihd.net
  *.litix.io;
media-src
  embedwistia-a.akamaihd.net
  *.wistia.net
  *.wistia.com;
worker-src
  blob:;

The main domains used by Wistia Embedded Videos SDK are:

wistia.com
akamaihd.net
litix.io
wistia.net

Example Content-Security-Policy violations / reports:

Using the above CSP package, will fix these errors that you may be seeing in your console logs:

script-src/script-src-elem/script-src-attrviolations

Refused to load the script 'https://fast.wistia.com/assets/external/E-v1.js' because it violates the following Content Security Policy directive: "script-src 'self' 'report-sample'". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback.

script-src/script-src-elem/script-src-attrviolations

Refused to load the script 'https://fast.wistia.com/assets/external/E-v1.js' because it violates the following Content Security Policy directive: "script-src 'self' 'report-sample'". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback.

script-src/script-src-elem/script-src-attrviolations

Refused to load the script 'https://fast.wistia.com/assets/external/E-v1.js' because it violates the following Content Security Policy directive: "script-src 'self' 'report-sample'". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback.

style-src/style-src-elem/style-src-attrviolations

Refused to load the stylesheet 'wistia.com' because it violates the following Content Security Policy directive: "style-src 'self' 'report-sample'". Note that 'style-src-elem' was not explicitly set, so 'style-src' is used as a fallback.

If you see inline style errors, you need to add SHA-256 hashes / nonces to your CSP with RapidSec:

Refused to apply inline style because it violates the following Content Security Policy directive: "style-src 'self' 'report-sample'". Either the 'unsafe-inline' keyword, a hash ('sha256-RFWPLDbv2BY+rCkDzsE+0fr8ylGr2R2faWMhq4lfEQc='), or a nonce ('nonce-...') is required to enable inline execution.

font-srcviolations

Refused to load the font 'https://fast.wistia.com/fonts/WistiaOpenSansBold.woff' because it violates the following Content Security Policy directive: "font-src 'self'"

img-srcviolations

Refused to load the image 'wistia.com' because it violates the following Content Security Policy directive: "img-src 'self'".

frame-srcviolations

[Report Only] Refused to frame 'wistia.com' because it violates the following Content Security Policy directive: "frame-src 'self'".

form-actionviolations

[Report Only] Refused to send form data to 'wistia.com' because it violates the following Content Security Policy directive: "form-action 'self'".

connect-srcviolations

[Report Only] Refused to connect to 'wistia.com' because it violates the following Content Security Policy directive: "connect-src 'self'"