# TaintedHeader Potential header injection. This rule is emitted when user-controlled input can be passed into a HTTP header. ## Risk The risk of a header injection depends hugely on your environment. If your webserver supports something like [`XSendFile`](https://www.nginx.com/resources/wiki/start/topics/examples/xsendfile/) / [`X-Accel`](https://www.nginx.com/resources/wiki/start/topics/examples/x-accel/), an attacker could potentially access arbitrary files on the systems. If your system does not do that, there may be other concerns, such as: - Cookie Injection - Open Redirects - Proxy Cache Poisoning ## Example ```php