Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-200 (信息暴露) — Vulnerability Class 2752

2752 vulnerabilities classified as CWE-200 (信息暴露). AI Chinese analysis included.

CWE-200 represents a critical information disclosure weakness where software inadvertently reveals sensitive data to unauthorized entities. This vulnerability is typically exploited by attackers who leverage insufficient access controls, insecure direct object references, or verbose error messages to harvest credentials, personal identifiable information, or internal system details. By analyzing network traffic or manipulating application inputs, adversaries can extract this exposed data to facilitate further attacks, such as identity theft or privilege escalation. To mitigate this risk, developers must implement strict access control mechanisms, ensuring that data retrieval is validated against user permissions. Additionally, employing robust encryption for data at rest and in transit, along with sanitizing error outputs to prevent information leakage, significantly reduces the attack surface. Regular security audits and adherence to the principle of least privilege further ensure that sensitive information remains protected from unauthorized exposure.

MITRE CWE Description
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as personal messages, financial data, health records, geographic location, or contact details system status and environment, such as the operating system and installed packages business secrets and intellectual property network status and configuration the product's own code or internal state metadata, e.g. logging of connections or message headers indirect information, such as a discrepancy between two internal operations that can be observed by an outsider Information might be sensitive to different parties, each of which may have their own expectations for whether the information should be protected. These parties include: the product's own users people or organizations whose information is created or used by the product, even if they are not direct product users the product's administrators, including the admins of the system(s) and/or networks on which the product operates the developer Information exposures can occur in different ways: the code explicitly inserts sensitive information into …
Common Consequences (1)
ConfidentialityRead Application Data
Mitigations (1)
Architecture and DesignCompartmentalize the system to have "safe" areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area. Ensure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separatio…
Examples (2)
The following code checks validity of the supplied username and password and notifies the user of a successful or failed login.
my $username=param('username'); my $password=param('password'); if (IsValidUsername($username) == 1) { if (IsValidPassword($username, $password) == 1) { print "Login Successful"; } else { print "Login Failed - incorrect password"; } } else { print "Login Failed - unknown username"; }
Bad · Perl
"Login Failed - incorrect username or password"
Result
This code tries to open a database connection, and prints any exceptions that occur.
try { openDbConnection(); } //print exception message that includes exception message and configuration file location catch (Exception $e) { echo 'Caught exception: ', $e->getMessage(), '\n'; echo 'Check credentials in config file at: ', $Mysql_config_location, '\n'; }
Bad · PHP
CVE IDTitleCVSSSeverityPublished
CVE-2025-24373 Unrestricted Access to PDF Documents via URL Manipulation in woocommerce-pdf-invoices-packing-slips — woocommerce-pdf-invoices-packing-slips 6.5 -2025-02-04
CVE-2025-24899 Disclosure of Sensitive User Information via API in reNgine — rengine 6.5 -2025-02-03
CVE-2025-23215 PMD Designer's release key passphrase (GPG) available on Maven Central in cleartext — pmd 9.8 -2025-01-31
CVE-2024-11741 Grafana 安全漏洞 — Grafana 4.3 Medium2025-01-31
CVE-2024-13623 Order Export for WooCommerce <= 3.24 - Unauthenticated Sensitive Information Exposure Through Unprotected Directory — Order Export for WooCommerce 5.9 Medium2025-01-31
CVE-2024-23937 Silicon Labs Gecko OS Debug Interface Format String — Gecko OS 4.3 Medium2025-01-31
CVE-2024-23962 Alpine Halo9 Missing Authentication — Halo9 5.3 Medium2025-01-30
CVE-2024-8494 Elementor Website Builder Pro – More than Just a Page Builder <= 3.25.10 - Authenticated (Contributor+) Sensitive Information Exposure via Shortcode — Elementor Website Builder Pro 4.3 Medium2025-01-30
CVE-2025-24884 kube-audit-rest's example logging configuration could disclose secret values in the audit log — kube-audit-rest 4.3 -2025-01-29
CVE-2025-23212 Tandoor Recipes - Local file disclosure - Users can read the content of any file on the server — recipes 7.7 High2025-01-28
CVE-2025-0659 Path Traversal and Rockwell Automation Third-party Vulnerability in DataMosaix™ Private Cloud — DataEdgePlatform DataMosaix™ Private Cloud 4.9 -2025-01-28
CVE-2024-11090 Membership Plugin – Restrict Content <= 3.2.13 - Unauthenticated Content Restriction Bypass to Sensitive Information Exposure — Membership Plugin – Restrict Content 5.3 Medium2025-01-26
CVE-2024-13562 Import WP – Export and Import CSV and XML files to WordPress <= 2.14.5 - Unauthenticated Sensitive Information Exposure Through Unprotected Directory — Import WP – Export and Import CSV and XML files to WordPress 7.5 High2025-01-25
CVE-2025-24360 Opening a malicious website while running a Nuxt dev server could allow read-only access to code — nuxt 5.3 Medium2025-01-25
CVE-2025-24363 The HL7 FHIR IG publisher may potentially expose GitHub repo user and credential information — fhir-ig-publisher 4.2 Medium2025-01-24
CVE-2025-22612 Coolify Vulnerable to Private Key Enumeration on Onboarding resulting in Remote Command Execution (RCE) — coolify 10.0 Critical2025-01-24
CVE-2025-22607 Coolify Vulnerable to GitHub / GitLab OAuth Secrets Leak — coolify 6.5 -2025-01-24
CVE-2024-52975 Fleet Server sensitive information exposure via logs — Fleet Server 9.0 Critical2025-01-23
CVE-2024-43707 Kibana exposure of sensitive information to an unauthorized actor — Kibana 7.7 High2025-01-23
CVE-2025-23047 Cilium vulnerable to information leakage via insecure default Hubble UI CORS header — cilium 6.5 Medium2025-01-22
CVE-2025-24011 Umbraco CMS Vulnerable to User Enumeration Feasible Based On Management API Timing and Response Codes — Umbraco-CMS 5.3 Medium2025-01-21
CVE-2025-0318 Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin <= 2.9.1 - Information Exposure — Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin 5.3 Medium2025-01-18
CVE-2024-12142 Schneider Electric Modicon M340 信息泄露漏洞 — Modicon M340 processors (part numbers BMXP34*) 8.6 High2025-01-17
CVE-2024-12637 Moving Users <= 1.05 - Unauthenticated Sensitive Information Exposure — Moving Users 5.3 Medium2025-01-17
CVE-2024-56136 /api/v1/jwt/fetch_api_key endpoint can leak if an email address has an account in Zulip server — zulip 5.3 -2025-01-16
CVE-2025-0472 Information exposure vulnerability in PMB platform — PMB platform 7.5 High2025-01-16
CVE-2025-0481 D-Link DIR-878 HTTP POST Request dllog.cgi information disclosure — DIR-878 5.3 Medium2025-01-15
CVE-2025-23074 Special:EditProfile exposes the contents of profile fields marked "hidden"/friends or "friends of friends" when the privileged user isn't a friend of the user whose profile they edit(ed) — Mediawiki - SocialProfile Extension 9.1 -2025-01-14
CVE-2025-23073 API list=globalblocks can reveal IP of autoblock if username and IP are included in the bgtargets parameter — Mediawiki - GlobalBlocking Extension 7.5 -2025-01-14
CVE-2024-50338 Carriage-return character in remote URL allows malicious repository to leak credentials in Git Credential Manager — git-credential-manager 7.4 High2025-01-14

Vulnerabilities classified as CWE-200 (信息暴露) represent 2752 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.