Description
The web application uses an HTTP method to process a request, but the request includes sensitive information in the query string.
Potential Impact
Confidentiality
Read Application Data
Mitigations & Prevention
When sending sensitive information, only include it in the request body or request headers instead of the query string. This may require avoiding use of GET requests.
Detection Methods
- Automated Static Analysis High — Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then sea
Real-World CVE Examples
| CVE ID | Description |
|---|---|
| CVE-2025-1738 | Security camera includes a password in its query string |
| CVE-2025-31954 | ML/NLP-based automation product calls a GET method with sensitive information in the query string. |
| CVE-2024-31842 | Web-based communication product includes an access token in the query string of a GET request |
| CVE-2022-23546 | A discussion platform leaks private information in GET requests. |
Related Weaknesses
Taxonomy Mappings
- Software Fault Patterns: SFP23 — Exposed Data
Frequently Asked Questions
What is CWE-598?
CWE-598 (Use of HTTP Request With Sensitive Query String) is a software weakness identified by MITRE's Common Weakness Enumeration. It is classified as a Variant-level weakness. The web application uses an HTTP method to process a request, but the request includes sensitive information in the query string.
How can CWE-598 be exploited?
Attackers can exploit CWE-598 (Use of HTTP Request With Sensitive Query String) to read application data. This weakness is typically introduced during the Architecture and Design, Implementation phase of software development.
How do I prevent CWE-598?
Key mitigations include: When sending sensitive information, only include it in the request body or request headers instead of the query string. This may require avoiding use of GE
What is the severity of CWE-598?
CWE-598 is classified as a Variant-level weakness (Low-Medium abstraction). It has been observed in 4 real-world CVEs.