Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-532 (通过日志文件的信息暴露) — Vulnerability Class 604

604 vulnerabilities classified as CWE-532 (通过日志文件的信息暴露). AI Chinese analysis included.

CWE-532 represents a critical information disclosure weakness where software inadvertently records sensitive data, such as passwords, credit card numbers, or personal identifiers, into log files. This vulnerability is typically exploited by attackers who gain access to these logs through insufficient file permissions, insecure storage practices, or compromised administrative accounts. Once accessed, the exposed data can be harvested for identity theft, financial fraud, or further system intrusion. To prevent this, developers must implement strict data sanitization protocols, ensuring that sensitive fields are masked or excluded before logging. Additionally, employing robust access controls and encryption for log storage, alongside regular audits of logging configurations, helps mitigate the risk of accidental exposure. By treating log files as potential repositories of confidential information, organizations can significantly reduce their attack surface and maintain compliance with data protection standards.

MITRE CWE Description
The product writes sensitive information to a log file.
Common Consequences (1)
ConfidentialityRead Application Data
Logging sensitive user data, full path names, or system information often provides attackers with an additional, less-protected path to acquiring the information.
Mitigations (4)
Architecture and Design, ImplementationConsider seriously the sensitivity of the information written into log files. Do not write secrets into the log files.
DistributionRemove debug log files before deploying the application into production.
OperationProtect log files against unauthorized read/write.
ImplementationAdjust configurations appropriately when software is transitioned from a debug state to production.
Examples (2)
In the following code snippet, a user's full name and credit card number are written to a log file.
logger.info("Username: " + usernme + ", CCN: " + ccn);
Bad · Java
This code stores location information about the current user:
locationClient = new LocationClient(this, this, this); locationClient.connect(); currentUser.setLocation(locationClient.getLastLocation()); ... catch (Exception e) { AlertDialog.Builder builder = new AlertDialog.Builder(this); builder.setMessage("Sorry, this application has experienced an error."); AlertDialog alert = builder.create(); alert.show(); Log.e("ExampleActivity", "Caught exception: " + e + " While on User:" + User.toString()); }
Bad · Java
CVE IDTitleCVSSSeverityPublished
CVE-2023-51408 WordPress WP Optin Wheel Plugin <= 1.4.3 is vulnerable to Sensitive Data Exposure — WP Optin Wheel – Gamified Optin Email Marketing Tool for WordPress and WooCommerce 5.3 Medium2024-01-08
CVE-2023-51490 WordPress Defender Security Plugin <= 4.1.0 is vulnerable to Sensitive Data Exposure — Defender Security – Malware Scanner, Login Security & Firewall 5.3 Medium2024-01-08
CVE-2023-51508 WordPress Database Cleaner Plugin <= 0.9.8 is vulnerable to Sensitive Data Exposure — Database Cleaner: Clean, Optimize & Repair 5.3 Medium2024-01-08
CVE-2023-52143 WordPress WP Stripe Checkout Plugin <= 1.2.2.37 is vulnerable to Sensitive Data Exposure — WP Stripe Checkout 7.5 High2024-01-05
CVE-2023-52146 WordPress 404 Solution Plugin <= 2.33.0 is vulnerable to Sensitive Data Exposure — 404 Solution 5.3 Medium2024-01-05
CVE-2023-46742 CubeFS leaks users key in logs — cubefs 4.8 Medium2024-01-03
CVE-2023-6802 Sensitive Information in Log File in GitHub Enterprise Server — Enterprise Server 7.2 High2023-12-21
CVE-2023-6746 Sensitive Information in Log File in GitHub Enterprise Server — Enterprise Server 8.1 High2023-12-21
CVE-2023-46675 Kibana Insertion of Sensitive Information into Log File — Kibana 8.0 High2023-12-13
CVE-2023-46671 Kibana Insertion of Sensitive Information into Log File — Kibana 8.0 High2023-12-13
CVE-2023-6687 Elastic Agent Insertion of Sensitive Information into Log File — Elastic Agent 6.8 Medium2023-12-12
CVE-2023-49922 Beats Insertion of Sensitive Information into Log File — Beats 6.8 Medium2023-12-12
CVE-2023-49923 Enterprise Search Insertion of Sensitive Information into Log File — Enterprise Search 6.8 Medium2023-12-12
CVE-2023-48708 Insertion of Sensitive Information into Log in codeigniter4/shield — shield 5.0 Medium2023-11-24
CVE-2023-25682 IBM Sterling B2B Integrator information disclosure — Sterling B2B Integrator Standard Edition 6.2 Medium2023-11-22
CVE-2023-46672 Logstash Insertion of Sensitive Information into Log File — Logstash 8.4 High2023-11-15
CVE-2023-45585 Fortinet FortiSIEM 安全漏洞 — FortiSIEM 2.1 Low2023-11-14
CVE-2023-0436 Secret logging may occur in debug mode of Atlas Operator — MongoDB Atlas Kubernetes Operator 4.5 Medium2023-11-07
CVE-2023-46255 `SPICEDB_DATASTORE_CONN_URI` is leaked when URI cannot be parsed — spicedb 4.2 Medium2023-10-31
CVE-2023-46215 Apache Airflow Celery provider, Apache Airflow: Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend — Apache Airflow Celery provider 7.5 -2023-10-28
CVE-2023-31417 Elasticsearch Insertion of sensitive information in audit logs — Elasticsearch 4.1 Medium2023-10-26
CVE-2023-31422 Kibana Insertion of Sensitive Information into Log File — Kibana 9.0 Critical2023-10-26
CVE-2023-46667 Fleet Server Insertion of Sensitive Information into Log File — Fleet Server 8.1 High2023-10-26
CVE-2023-46668 Elastic Endpoint Insertion of Sensitive Information into Log File — Endpoint 4.6 Medium2023-10-25
CVE-2023-44483 Apache Santuario: Private Key disclosure in debug-log output — Apache Santuario 7.5 -2023-10-20
CVE-2023-45825 Token in custom credentials object can leak through logs in ydb-go-sdk — ydb-go-sdk 5.5 Medium2023-10-19
CVE-2023-40682 IBM App Connect Enterprise information disclosure — App Connect Enterprise 4.4 Medium2023-10-13
CVE-2023-25604 Fortinet FortiGuest 日志信息泄露漏洞 — FortiGuest 5.5 Medium2023-10-10
CVE-2023-5499 Shenzhen Reachfar v28 information exposure — Shenzhen Reachfar v28 7.5 High2023-10-10
CVE-2023-43485 BIGIP and BIG-IQ TACACS+ audit log Vulnerability — BIG-IP 5.5 Medium2023-10-10

Vulnerabilities classified as CWE-532 (通过日志文件的信息暴露) represent 604 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.