SiteShadow
Back to vulnerability library

CWE-97 Server-Side Include Injection

What this means

SiteShadow flagged server-side include (SSI) directives being built from untrusted input. SSI features can include files or execute commands depending on server configuration.

Why it matters

SSI injection can read files or execute commands on the server.

Safer examples

1) Disable SSI where not needed

Turn off SSI processing in your server for user-controlled content.

2) Don't build include directives from user input

Use allowlists of known includes or server-side templates that don't interpret directives.

3) Treat includes as privileged

If includes are needed, ensure paths are fixed/allowlisted and not user-controlled (see CWE-23 / CWE-36).

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage