CWE-256 - Plaintext Storage of a Password
- Abstraction:Base
- Structure:Simple
- Status:Incomplete
- Release Date:2006-07-19
- Latest Modification Date:2024-02-29
Weakness Name
Plaintext Storage of a Password
Description
Storing a password in plaintext may result in a system compromise.
Password management issues occur when a password is stored in plaintext in an application's properties, configuration file, or memory. Storing a plaintext password in a configuration file allows anyone who can read the file access to the password-protected resource. In some contexts, even storage of a plaintext password in memory is considered a security risk if the password is not cleared immediately after it is used.
Common Consequences
Scope: Access Control
Impact: Gain Privileges or Assume Identity
Related Weaknesses
Oracle Health breach compromises patient data at US hospitals
Attackers are targeting CrushFTP vulnerability with public PoC (CVE-2025-2825)
We Smell a (DC)Rat: Revealing a Sophisticated Malware Delivery Chain
CISA Warns of Active Exploitation in GitHub Action Supply Chain Compromise
Oracle denies breach after hacker claims theft of 6 million data records
Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp
CrushFTP: Patch critical vulnerability ASAP! (CVE-2025-2825)
CVE-2025-22224 VMware ESXi and Workstation TOCTOU Race Condition Vulnerability
CVE-2018-19410 Paessler PRTG Network Monitor Local File Inclusion Vulnerability
CVE-2020-29574 CyberoamOS (CROS) SQL Injection Vulnerability
CVE-2018-8639 Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability
CVE-2024-49035 Microsoft Partner Center Improper Access Control Vulnerability
CVE-2024-50302 Linux Kernel Use of Uninitialized Resource Vulnerability
CVE-2025-0111 Palo Alto Networks PAN-OS File Read Vulnerability
CVE-2024-40890 Zyxel DSL CPE OS Command Injection Vulnerability
InformationalInformation Disclosure - Suspicious Comments
HighPII Disclosure