SiteShadow
Back to vulnerability library

CWE-539 Information Exposure Through Persistent Cookies or Browser Storage

What this means

SiteShadow flagged sensitive data being stored in browser-accessible storage (persistent cookies, localStorage, sessionStorage) where it can be recovered or stolen (especially in the presence of XSS).

Why it matters

Persisted data can be recovered or abused by attackers.

Safer examples

1) Prefer HttpOnly cookies for session tokens

HttpOnly cookies aren't readable by JavaScript, reducing XSS token theft (see S02 / CWE-614).

2) Minimize what you store in the browser

Avoid storing secrets; store opaque identifiers and fetch sensitive data from the server as needed.

3) Reduce lifetime and scope

Short expirations, revocation, and least-privilege scopes (see TOK01).

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage