SiteShadow
Back to vulnerability library

CWE-96 Static Code Injection

What this means

SiteShadow flagged a pattern where untrusted input is written into a file/template/config that is later executed or interpreted by the server (generated code, templates, cron/job definitions, server configs).

Why it matters

Attackers can inject server-side code that executes later.

Safer examples

1) Don't generate executable code from user input

Store user content as data (e.g., JSON rows) and interpret it with a safe allowlisted interpreter.

2) If generating templates, keep user input in data positions only

Never place untrusted input into template directives/logic; treat it as text and escape/encode for the target context.

3) Lock down write locations and execution paths

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage