SiteShadow
Back to vulnerability library

CWE-219 Sensitive Data Under Web Root

What this means

SiteShadow flagged sensitive files being stored in a location that can be served by the web server (under the web root). If the path is guessable or indexed, the data can be downloaded without authentication.

Why it matters

Web-exposed files can be accessed without authentication.

Safer examples

1) Store secrets and uploads outside web root

Keep sensitive storage in non-public directories and serve through authenticated handlers when needed.

2) Use separate buckets/paths for public assets vs private data

Static assets can be public; uploads/backups/exports should not share that namespace.

3) Add server-side deny rules (defense-in-depth)

Configure your web server to deny access to sensitive patterns (.env, backups, logs) even if mislocated.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage