<iframe>: The Inline Frame element
<iframe> HTML element represents a nested browsing context, embedding another HTML page into the current one.
Each embedded browsing context has its own document and allows URL navigations. The navigations of each embedded browsing context are linearized into the session history of the topmost browsing context. The browsing context that embeds the others is called the parent browsing context. The topmost browsing context — the one with no parent — is usually the browser window, represented by the
Warning: Because each browsing context is a complete document environment, every
<iframe> in a page requires increased memory and other computing resources. While theoretically you can use as many
<iframe>s as you like, check for performance problems.
This element includes the global attributes.
Specifies a Permissions Policy for the
<iframe>. The policy defines what features are available to the
<iframe>(for example, access to the microphone, camera, battery, web-share, etc.) based on the origin of the request.
Note: A Permissions Policy specified by the
allowattribute implements a further restriction on top of the policy specified in the
Permissions-Policyheader. It doesn't replace it.
<iframe>can activate fullscreen mode by calling the
Note: This attribute is considered a legacy attribute and redefined as
trueif a cross-origin
<iframe>should be allowed to invoke the Payment Request API.
Note: This attribute is considered a legacy attribute and redefined as
trueto make the
<iframe>credentialless, meaning that its content will be loaded in a new, ephemeral context. It doesn't have access to the network, cookies, and storage data associated with its origin. It uses a new context local to the top-level document lifetime. In return, the
Cross-Origin-Embedder-Policy(COEP) embedding rules can be lifted, so documents with COEP set can embed third-party documents that do not. See IFrame credentialless for more details.
A Content Security Policy enforced for the embedded resource. See
The height of the frame in CSS pixels. Default is
Indicates how the browser should load the iframe:
eager: Load the iframe immediately, regardless if it is outside the visible viewport (this is the default value).
lazy: Defer loading of the iframe until it reaches a calculated distance from the viewport, as defined by the browser.
A targetable name for the embedded browsing context. This can be used in the
targetattribute of the
formtargetattribute of the
<button>elements; or the
windowNameparameter in the
Indicates which referrer to send when fetching the frame's resource:
Refererheader will not be sent.
Refererheader will not be sent to origins without TLS (HTTPS).
origin: The sent referrer will be limited to the origin of the referring page: its scheme, host, and port.
origin-when-cross-origin: The referrer sent to other origins will be limited to the scheme, the host, and the port. Navigations on the same origin will still include the path.
same-origin: A referrer will be sent for same origin, but cross-origin requests will contain no referrer information.
strict-origin: Only send the origin of the document as the referrer when the protocol security level stays the same (HTTPS→HTTPS), but don't send it to a less secure destination (HTTPS→HTTP).
strict-origin-when-cross-origin(default): Send a full URL when performing a same-origin request, only send the origin when the protocol security level stays the same (HTTPS→HTTPS), and send no header to a less secure destination (HTTPS→HTTP).
unsafe-url: The referrer will include the origin and the path (but not the fragment, password, or username). This value is unsafe, because it leaks origins and paths from TLS-protected resources to insecure origins.
Controls the restrictions applied to the content embedded in the
<iframe>. The value of the attribute can either be empty to apply all restrictions, or space-separated tokens to lift particular restrictions:
allow-downloads: Allows downloading files through an
<area>element with the download attribute, as well as through the navigation that leads to a download of a file. This works regardless of whether the user clicked on the link, or JS code initiated it without user interaction.
allow-downloads-without-user-activationExperimental : Allows for downloads to occur without a gesture from the user.
allow-forms: Allows the page to submit forms. If this keyword is not used, form will be displayed as normal, but submitting it will not trigger input validation, sending data to a web server or closing a dialog.
allow-modals: Allows the page to open modal windows by
Window.prompt(), while opening a
<dialog>is allowed regardless of this keyword. It also allows the page to receive
allow-orientation-lock: Lets the resource lock the screen orientation.
allow-pointer-lock: Allows the page to use the Pointer Lock API.
allow-popups: Allows popups (like from
Window.showModalDialog()). If this keyword is not used, that functionality will silently fail.
allow-popups-to-escape-sandbox: Allows a sandboxed document to open new windows without forcing the sandboxing flags upon them. This will allow, for example, a third-party advertisement to be safely sandboxed without forcing the same restrictions upon the page the ad links to.
allow-presentation: Allows embedders to have control over whether an iframe can start a presentation session.
allow-scripts: Allows the page to run scripts (but not create pop-up windows). If this keyword is not used, this operation is not allowed.
allow-storage-access-by-user-activationExperimental : Allows a document loaded in the
<iframe>to use the Storage Access API to request access to unpartitioned cookies.
allow-top-navigation: Lets the resource navigate the top-level browsing context (the one named
allow-top-navigation-by-user-activation: Lets the resource navigate the top-level browsing context, but only if initiated by a user gesture.
allow-top-navigation-to-custom-protocols: Allows navigations to non-
httpprotocols built into browser or registered by a website. This feature is also activated by
- When the embedded document has the same origin as the embedding page, it is strongly discouraged to use both
allow-same-origin, as that lets the embedded document remove the
sandboxattribute — making it no more secure than not using the
sandboxattribute at all.
- Sandboxing is useless if the attacker can display content outside a sandboxed
iframe— such as if the viewer opens the frame in a new tab. Such content should be also served from a separate origin to limit potential damage.
The URL of the page to embed. Use a value of
about:blankto embed an empty page that conforms to the same-origin policy. Also note that programmatically removing an
<iframe>'s src attribute (e.g. via
about:blankto be loaded in the frame in Firefox (from version 65), Chromium-based browsers, and Safari/iOS.
Inline HTML to embed, overriding the
srcattribute. If a browser does not support the
srcdocattribute, it will fall back to the URL in the
The width of the frame in CSS pixels. Default is
These attributes are deprecated and may no longer be supported by all user agents. You should not use them in new content, and try to remove them from existing content.
The alignment of this element with respect to the surrounding context.
1(the default) draws a border around this frame. The value
0removes the border around this frame, but you should instead use the CSS property
A URL of a long description of the frame's content. Due to widespread misuse, this is not helpful for non-visual browsers.
The amount of space in pixels between the frame's content and its top and bottom borders.
The amount of space in pixels between the frame's content and its left and right borders.
Indicates when the browser should provide a scrollbar for the frame:
auto: Only when the frame's content is larger than its dimensions.
yes: Always show a scrollbar.
no: Never show a scrollbar.
Inline frames, like
<frame> elements, are included in the
With the DOM
HTMLIFrameElement object, scripts can access the
window object of the framed resource via the
contentWindow property. The
contentDocument property refers to the
document inside the
<iframe>, same as
From the inside of a frame, a script can get a reference to its parent window with
Script access to a frame's content is subject to the same-origin policy. Scripts cannot access most properties in other
window objects if the script was loaded from a different origin, including scripts inside a frame accessing the frame's parent. Cross-origin communication can be achieved using
Positioning and scaling
As a replaced element, the position, alignment, and scaling of the embedded document within the
<iframe> element's box, can be adjusted with the
A simple <iframe>
This example embeds the page at https://example.org in an iframe.
<iframe src="https://example.org" title="iframe Example 1" width="400" height="300"> </iframe>
People navigating with assistive technology such as a screen reader can use the
title attribute on an
<iframe> to label its content. The title's value should concisely describe the embedded content:
<iframe title="Wikipedia page for Avocados" src="https://en.wikipedia.org/wiki/Avocado"></iframe>
Without this title, they have to navigate into the
<iframe> to determine what its embedded content is. This context shift can be confusing and time-consuming, especially for pages with multiple
<iframe>s and/or if embeds contain interactive content like video or audio.
|Content categories||Flow content, phrasing content, embedded content, interactive content, palpable content.|
|Tag omission||None, both the starting and ending tag are mandatory.|
|Permitted parents||Any element that accepts embedded content.|
|Implicit ARIA role||No corresponding role|
|Permitted ARIA roles||
|HTML Standard |
BCD tables only load in the browser