SiteShadow
Back to vulnerability library

CWE-116 Improper Encoding or Escaping of Output

What this means

SiteShadow flagged output that is not being encoded/escaped correctly for its context (HTML, attributes, JavaScript, URLs, SQL, shell). "Escape for the right context" is the key.

Why it matters

Improper encoding enables XSS and injection attacks.

Safer examples

1) Prefer templating/framework defaults (escape by default)

Avoid "raw HTML" rendering modes unless sanitized.

2) Use safe APIs (textContent vs innerHTML)

el.textContent = userInput; // safe for text
// el.innerHTML = userInput; // risky

3) Use context-aware encoders/sanitizers

Use HTML escaping for HTML, URL encoding for URLs, and sanitizers for rich HTML.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage