Information
The Referrer-Policy HTTP header controls how much referrer information (sent via the Referer header) should be included with requests. It allows site administrators to restrict the data sent to upstream servers when a user clicks a link or loads a resource. This is a privacy control to prevent leaking sensitive URL parameters or internal path structures to third parties.
URLs often contain sensitive information such as session tokens, search queries, or P ersonally I dentifiable I nformation (PII) in their query parameters. Without a strict Referrer Policy, this full URL is transmitted to any third-party site the user visits from your page, potentially logging sensitive data on external servers. Configuring this header ensures that only the necessary information (e.g., just the origin domain) is shared, protecting user privacy and preventing data leakage.
Solution
Add the following line to your server or http block. This example uses the robust default setting that protects privacy without breaking internal analytics.
add_header Referrer-Policy \"strict-origin-when-cross-origin\" always;
If maximum privacy is required and no referrer data is needed even for internal links:
add_header Referrer-Policy \"no-referrer\" always;
Impact:
Choosing an overly restrictive policy like no-referrer can break functionality that relies on knowing the source of traffic, such as web analytics, affiliate tracking, or multi-site authentication flows. Conversely, a loose policy ( unsafe-url ) leaks private data. The recommended policy strict-origin-when-cross-origin is a balance by preserving full referrer data for internal navigation while stripping sensitive path and query data when navigating to external sites.