Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-497 (将系统数据暴露到未授权控制的范围) — Vulnerability Class 291

291 vulnerabilities classified as CWE-497 (将系统数据暴露到未授权控制的范围). AI Chinese analysis included.

CWE-497 represents a critical information disclosure weakness where software inadvertently exposes sensitive system-level details to unauthorized external entities. This vulnerability typically arises when network-facing applications, such as web servers, fail to sanitize error messages or headers, allowing attackers to glean valuable intelligence about the underlying operating system, database versions, or server configurations. Exploitation often involves analyzing verbose error responses or specific network packets to identify known vulnerabilities in the exposed software stack, facilitating targeted attacks like remote code execution. To mitigate this risk, developers must implement strict error handling protocols that return generic, user-friendly messages instead of detailed stack traces. Additionally, configuring web servers to suppress version information in headers and employing robust input validation ensures that internal system architecture remains obscured from potential adversaries, thereby reducing the attack surface significantly.

MITRE CWE Description
The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does. Network-based products, such as web applications, often run on top of an operating system or similar environment. When the product communicates with outside parties, details about the underlying system are expected to remain hidden, such as path names for data files, other OS users, installed packages, the application environment, etc. This system information may be provided by the product itself, or buried within diagnostic or debugging messages. Debugging information helps an adversary learn about the system and form an attack plan. An information exposure occurs when system data or debugging information leaves the program through an output stream or logging function that makes it accessible to unauthorized parties. Using other weaknesses, an attacker could cause errors to occur; the response to these errors can reveal detailed system information, along with other impacts. An attacker can use messages that reveal technologies, operating systems, and product versions to tune the attack against known vulnerabilities in these technologies. A product may use diagnostic methods that provide significant implementation details such as stack traces as part of its error handling mechanism.
Common Consequences (1)
ConfidentialityRead Application Data
Mitigations (1)
Architecture and Design, ImplementationProduction applications should never use methods that generate internal details such as stack traces and error messages unless that information is directly committed to a log that is not viewable by the end user. All error message text should be HTML entity encoded before being written to the log file to protect against potential cross-site scripting attacks against the viewer of the logs
Examples (2)
The following code prints the path environment variable to the standard error stream:
char* path = getenv("PATH"); ... sprintf(stderr, "cannot find exe on path %s\n", path);
Bad · C
This code prints all of the running processes belonging to the current user.
//assume getCurrentUser() returns a username that is guaranteed to be alphanumeric (avoiding CWE-78) $userName = getCurrentUser(); $command = 'ps aux | grep ' . $userName; system($command);
Bad · PHP
CVE IDTitleCVSSSeverityPublished
CVE-2025-13691 DataStage on Cloud Pak for Data is vulnerable to sensitive information leaks due to HTTP processing — DataStage on Cloud Pak for Data 8.1 High2026-02-17
CVE-2025-13651 LEAK OF SENSITIVE INFORMATION ON MICROCOM'S ZEUSWEB — ZeusWeb 7.5AIHighAI2026-02-11
CVE-2025-9986 Improper Access Control in Vadi Corporate Information System's DIGIKENT — DIGIKENT 8.2 High2026-02-11
CVE-2025-66599 Yokogawa FAST/TOOLS 安全漏洞 — FAST/TOOLS 5.3AIMediumAI2026-02-09
CVE-2025-14150 IBM webMethods Integration Sever is affected by — webMethods Integration (on prem) - Integration Server 6.5 Medium2026-02-05
CVE-2025-27550 IBM Jazz Reporting Service Information Disclosure — Jazz Reporting Service 3.5 Low2026-02-04
CVE-2026-25023 WordPress Run Contests, Raffles, and Giveaways with ContestsWP plugin <= 2.0.7 - Sensitive Data Exposure vulnerability — Run Contests, Raffles, and Giveaways with ContestsWP 5.3 Medium2026-02-03
CVE-2026-24998 WordPress Hustle plugin <= 7.8.9.2 - Sensitive Data Exposure vulnerability — Hustle 5.3 Medium2026-02-03
CVE-2025-36238 Power System Exposure of Sensitive System Information — PowerVM Hypervisor 6.0 Medium2026-02-02
CVE-2023-37525 HCL BigFix Compliance is vulnerable to a sensitive information disclosure — BigFix Compliance 5.3 Medium2026-01-28
CVE-2025-59098 Trace Functionality Leaking Sensitive Data in dormakaba access manager — Access Manager 92xx-k5 7.5AIHighAI2026-01-26
CVE-2026-24593 WordPress AWP Classifieds plugin <= 4.4.3 - Sensitive Data Exposure vulnerability — AWP Classifieds 5.3 Medium2026-01-23
CVE-2026-24553 WordPress Fraud Prevention For Woocommerce plugin <= 2.3.2 - Sensitive Data Exposure vulnerability — Fraud Prevention For Woocommerce 4.3 Medium2026-01-23
CVE-2026-24536 WordPress Webpushr plugin <= 4.38.0 - Sensitive Data Exposure vulnerability — Webpushr 5.3 Medium2026-01-23
CVE-2026-24523 WordPress WP FullCalendar plugin <= 1.6 - Sensitive Data Exposure vulnerability — WP FullCalendar 5.3 Medium2026-01-23
CVE-2026-24377 WordPress Nexter Blocks plugin <= 4.6.3 - Sensitive Data Exposure vulnerability — Nexter Blocks 4.3 Medium2026-01-22
CVE-2025-68046 WordPress Contact Form & Lead Form Elementor Builder plugin <= 2.0.1 - Sensitive Data Exposure vulnerability — Contact Form & Lead Form Elementor Builder 6.5 Medium2026-01-22
CVE-2025-67954 WordPress Salon booking system plugin <= 10.30.3 - Sensitive Data Exposure vulnerability — Salon booking system 6.5 Medium2026-01-22
CVE-2025-63051 WordPress REHub Framework plugin < 19.9.9.4 - Sensitive Data Exposure vulnerability — REHub Framework 4.3 Medium2026-01-22
CVE-2020-36926 SmarterTools SmarterTrack 7922 -Information Disclosure — SmarterTools SmarterTrack 7.5 High2026-01-15
CVE-2026-22915 SICK TDC-X401GL 安全漏洞 — TDC-X401GL 4.3 Medium2026-01-15
CVE-2026-0494 Information Disclosure vulnerability in SAP Fiori App (Intercompany Balance Reconciliation) — SAP Fiori App (Intercompany Balance Reconciliation) 4.3 Medium2026-01-13
CVE-2026-0853 A-Plus Video Technologies|NVR - Sensitive Data Exposure — AP-RM864P 5.3 Medium2026-01-12
CVE-2026-22537 INFORMATION DISCLOSURE WITHIN THE OPERATING SYSTEM — QC 60/90/120 4.6 -2026-01-07
CVE-2025-31051 WordPress Plant - Gardening & Houseplants WordPress Theme <= 1.0.0 - Sensitive Data Exposure Vulnerability — Plant - Gardening & Houseplants WordPress Theme 5.3 Medium2026-01-06
CVE-2020-36922 Sony BRAVIA Digital Signage 1.7.8 Unauthenticated System API Information Disclosure — Sony BRAVIA Digital Signage 7.5 High2026-01-06
CVE-2025-9110 QTS, QuTS hero — QTS 6.5 -2026-01-02
CVE-2025-49340 WordPress Direct Payments WP plugin <= 1.3.2 - Sensitive Data Exposure vulnerability — Direct Payments WP 4.3 Medium2025-12-31
CVE-2025-62083 WordPress BoomDevs WordPress Coming Soon plugin plugin <= 1.0.4 - Sensitive Data Exposure vulnerability — BoomDevs WordPress Coming Soon 4.3 Medium2025-12-31
CVE-2025-62143 WordPress Post Video Players plugin <= 1.163 - Sensitive Data Exposure vulnerability — Post Video Players 4.3 Medium2025-12-31

Vulnerabilities classified as CWE-497 (将系统数据暴露到未授权控制的范围) represent 291 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.