SiteShadow
Back to vulnerability library

CWE-525 Information Exposure Through the Browser

What this means

SiteShadow flagged sensitive data being exposed in browser-accessible places (URLs, DOM, caches, client-side storage, referrers) where it can leak to other origins, extensions, shared devices, or support tooling.

Why it matters

Browser-exposed data can leak through history, caches, or UI.

Safer examples

1) Don't put secrets in the browser

Avoid placing tokens/passwords in query strings, DOM attributes, or JS-accessible storage.

2) Use secure cookies and server-side sessions

Prefer HttpOnly cookies and server-side session state where feasible (see S02 / CWE-614).

3) Use cache controls for sensitive pages

Disable caching where appropriate (varies by app and content sensitivity).

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage