SiteShadow
Back to vulnerability library

CWE-454 External Initialization of Trusted Variables or Data Stores

What this means

SiteShadow flagged "trusted" values being initialized or populated from an untrusted source (client input, unsigned webhooks, headers, environment, files). This becomes dangerous when the value is later treated as authoritative (roles, prices, account IDs, feature flags, security settings).

Why it matters

Attackers can influence trusted values, leading to privilege escalation or logic bypass.

Safer examples

1) Make the server the source of truth

Load roles, plans, prices, and permissions from your database or trusted internal service, not from the request (see CWE-642 / B01).

2) Verify external inputs that must be trusted

For webhooks/config files, require signatures, enforce schemas, and restrict who can write them (see CWE-347 / A08).

3) Treat environment/config as privileged and validated

Use allowlists for env-driven options and avoid "insecure mode" toggles in production.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage