logo
Home/CWEs/CWE-526/

CWE-526 - Cleartext Storage of Sensitive Information in an Environment Variable

  • Abstraction:Variant
  • Structure:Simple
  • Status:Incomplete
  • Release Date:2006-07-19
  • Latest Modification Date:2023-06-29

Weakness Name

Cleartext Storage of Sensitive Information in an Environment Variable

Description

The product uses an environment variable to store unencrypted sensitive information.

Information stored in an environment variable can be accessible by other processes with the execution context, including child processes that dependencies are executed in, or serverless functions in cloud environments. An environment variable's contents can also be inserted into messages, headers, log files, or other outputs. Often these other dependencies have no need to use the environment variable in question. A weakness that discloses environment variables could expose this information.

Common Consequences

Scope: Confidentiality

Impact: Read Application Data

Related Weaknesses

CWE-214Invocation of Process Using Visible Sensitive Information

CWE-312Cleartext Storage of Sensitive Information