Cyber Posture

CWE · MITRE source

CWE-524Use of Cache Containing Sensitive Information

Abstraction: Base · CVEs in our corpus: 37

The code uses a cache that contains sensitive information, but the cache can be read by an actor outside of the intended control sphere.

Applications may use caches to improve efficiency when communicating with remote entities or performing intensive calculations. A cache maintains a pool of objects, threads, connections, pages, financial data, passwords, or other resources to minimize the time it takes to initialize and access these resources. If the cache is accessible to unauthorized actors, attackers can read the cache and obtain this sensitive information.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (1)AI

Control Title Family Why it addresses this CWE
SI-21Information RefreshSIRefreshing cached data or generating it ephemerally and deleting afterward directly mitigates storage of sensitive information in caches.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2021-240271.97.50.06112021-04-06
CVE-2025-647621.89.10.00082025-11-21
CVE-2024-279171.57.50.00122024-03-06
CVE-2024-455961.57.40.00752024-09-10
CVE-2024-123141.47.20.00082025-02-18
CVE-2019-94941.35.90.01452019-04-17
CVE-2025-692021.36.50.00062025-12-29
CVE-2026-255401.36.50.00022026-02-04
CVE-2023-374861.25.90.00172023-08-08
CVE-2025-577521.26.20.00072025-08-29
CVE-2025-99011.25.90.00042025-09-03
CVE-2019-94951.13.70.05932019-04-17
CVE-2022-329091.15.50.00072022-11-01
CVE-2021-448541.15.30.00202022-12-26
CVE-2024-08741.15.30.00162024-04-25
CVE-2024-495801.15.30.00012024-10-17
CVE-2025-51411.15.50.00072025-06-17
CVE-2025-615981.15.30.00052025-10-28
CVE-2025-695811.15.50.00012026-01-16
CVE-2026-244721.15.30.00012026-01-27
CVE-2025-148061.15.70.00012026-03-17
CVE-2019-112441.05.00.00102019-04-22
CVE-2024-419061.04.80.00362024-08-13
CVE-2019-149970.94.30.00202019-09-11
CVE-2022-32920.94.60.00252022-09-28