Cyber Posture

CWE · MITRE source

CWE-526Cleartext Storage of Sensitive Information in an Environment Variable

Abstraction: Variant · CVEs in our corpus: 16

The product uses an environment variable to store unencrypted sensitive information.

Information stored in an environment variable can be accessible by other processes with the execution context, including child processes that dependencies are executed in, or serverless functions in cloud environments. An environment variable's contents can also be inserted into messages, headers, log files, or other outputs. Often these other dependencies have no need to use the environment variable in question. A weakness that discloses environment variables could expose this information.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (0)AI

Control Title Family Why it addresses this CWE
No NIST controls proposed yet.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2023-57201.77.70.02712023-11-15
CVE-2025-283811.57.50.00432025-06-13
CVE-2026-401531.57.40.00032026-04-09
CVE-2024-27001.47.00.00042024-04-04
CVE-2024-43691.46.80.00032024-05-01
CVE-2023-430291.46.80.00062025-03-21
CVE-2024-126041.36.50.00102025-03-10
CVE-2025-360171.36.50.00032025-12-08
CVE-2025-09851.15.50.00102025-02-28
CVE-2025-278991.15.30.00042026-02-17
CVE-2024-117361.04.90.00022025-01-14
CVE-2025-91621.04.90.00032025-08-21
CVE-2025-361050.94.40.00012026-03-10
CVE-2023-476150.73.30.00022023-11-09
CVE-2023-359310.63.10.00462023-06-23
CVE-2014-23770.00.00.00522014-09-15