SiteShadow
Back to vulnerability library

CWE-598 Information Exposure Through Query Strings

What this means

SiteShadow flagged sensitive data being placed into URL query parameters (tokens, passwords, API keys, personal data).

Why it matters

Query strings can leak through logs, history, and referrers.

Safer examples

1) Use headers or POST bodies for secrets

await fetch("/api/resource", {
  method: "POST",
  headers: { Authorization: `Bearer ${token}` },
});

2) Use opaque IDs instead of raw data

Put an ID in the URL, not the sensitive value itself.

3) Redact URLs in logs/telemetry

If URLs must include sensitive values (avoid it), ensure redaction happens before logging/analytics.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage