SiteShadow
Back to vulnerability library

CWE-312 Cleartext Storage of Sensitive Information

What this means

SiteShadow flagged sensitive information being stored in plaintext (database fields, config files, caches, exports, or local files) without appropriate protection.

Why it matters

Cleartext data can be exposed in breaches or logs.

Safer examples

1) Store secrets in a secret manager (not in the DB)

Prefer managed secret storage and short-lived tokens when possible.

2) If you must store sensitive values, encrypt at rest properly

Use authenticated encryption with a managed key (KMS/HSM) and strict access controls.

3) Reduce what you store

Store hashes/tokens/ids instead of raw sensitive values when feasible.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage