Variant · Low-Medium

CWE-598: Use of HTTP Request With Sensitive Query String

The web application uses an HTTP method to process a request, but the request includes sensitive information in the query string.

CWE-598 · Variant Level ·4 CVEs ·1 Mitigations

Description

The web application uses an HTTP method to process a request, but the request includes sensitive information in the query string.

Potential Impact

Confidentiality

Read Application Data

Mitigations & Prevention

Implementation

When sending sensitive information, only include it in the request body or request headers instead of the query string. This may require avoiding use of GET requests.

Detection Methods

  • Automated Static Analysis High — Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then sea

Real-World CVE Examples

CVE IDDescription
CVE-2025-1738Security camera includes a password in its query string
CVE-2025-31954ML/NLP-based automation product calls a GET method with sensitive information in the query string.
CVE-2024-31842Web-based communication product includes an access token in the query string of a GET request
CVE-2022-23546A discussion platform leaks private information in GET requests.

Taxonomy Mappings

  • Software Fault Patterns: SFP23 — Exposed Data

Frequently Asked Questions

What is CWE-598?

CWE-598 (Use of HTTP Request With Sensitive Query String) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Variant-level weakness. The web application uses an HTTP method to process a request, but the request includes sensitive information in the query string.

How can CWE-598 be exploited?

Attackers can exploit CWE-598 (Use of HTTP Request With Sensitive Query String) to read application data. This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.

How do I prevent CWE-598?

Key mitigations include: When sending sensitive information, only include it in the request body or request headers instead of the query string. This may require avoiding use of GE

What is the severity of CWE-598?

CWE-598 is classified as a Variant-level weakness (Low-Medium abstraction). It has been observed in 4 real-world CVEs.