SiteShadow
Back to vulnerability library

CWE-311 Missing Encryption of Sensitive Data

What this means

SiteShadow flagged sensitive data being stored or transmitted without encryption where encryption is expected (tokens, credentials, PII, customer data, backups).

Why it matters

Unencrypted sensitive data can be exposed or intercepted.

Safer examples

1) Use TLS for data in transit

Use HTTPS for all sensitive endpoints and keep certificate verification enabled (see T01 / CWE-295 / CWE-296).

2) Encrypt sensitive data at rest (when appropriate)

If you must store sensitive values, use vetted libraries and authenticated encryption (AES‑GCM / ChaCha20‑Poly1305) and manage keys securely.

3) Don't "encrypt passwords"

Passwords should be hashed using a password hashing algorithm (Argon2id/scrypt/bcrypt) (see P02 / CWE-256).

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage