Cyber Posture

CWE · MITRE source

CWE-532Insertion of Sensitive Information into Log File

Abstraction: Base · CVEs in our corpus: 1,101

The product writes sensitive information to a log file.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (9)AI

Control Title Family Why it addresses this CWE
AU-1Policy and ProceduresAUProcedures mandate excluding sensitive data from logs to prevent unauthorized exposure via audit records.
AU-13Monitoring for Information DisclosureAUIdentifies insertion of sensitive data into logs, allowing detection of unauthorized disclosure.
AU-16Cross-organizational Audit LoggingAUCross-organizational coordination enables agreement on what data to include in audit logs, directly reducing insertion of sensitive information.
CM-13Data Action MappingCMIdentifying logging as a data action allows prevention of sensitive information being inserted into log files.
IR-9Information Spillage ResponseIRThe process of identifying and eradicating spilled information applies directly to sensitive data inserted into log files.
PT-7Specific Categories of Personally Identifiable InformationPTSpecific processing rules for sensitive PII categories commonly include restrictions on logging, making insertion of such data into log files less likely.
RA-8Privacy Impact AssessmentsRAPIAs detect planned or existing logging of PII and require removal or protection, preventing insertion of sensitive information into logs.
SC-38Operations SecuritySCLimits insertion of sensitive operational details into logs by treating such data as key information requiring protection.
SI-15Information Output FilteringSIChecking application output against expected content catches insertion of sensitive values into log streams or files.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2023-432617.17.50.93142023-10-04
CVE-2020-352346.47.50.81462020-12-14
CVE-2019-16226.15.30.84802019-06-27
CVE-2024-204406.17.50.77262024-09-04
CVE-2023-226494.48.40.45192024-10-16
CVE-2025-144374.27.50.45372025-12-18
CVE-2025-24984 KEV3.14.60.02832025-03-11
CVE-2023-21492 KEV2.94.40.00322023-05-04
CVE-2018-126042.87.50.22142018-06-20
CVE-2024-529402.77.50.19962024-11-18
CVE-2018-36092.68.10.16272018-02-16
CVE-2018-117162.59.80.09052018-07-16
CVE-2018-117172.59.80.09172018-07-16
CVE-2024-94662.56.50.20122024-10-09
CVE-2017-80752.19.80.01902017-04-23
CVE-2017-61652.19.80.01952017-10-20
CVE-2018-179222.19.80.02452018-11-02
CVE-2016-82332.09.80.00402017-03-01
CVE-2017-72142.09.80.01302017-03-21
CVE-2017-80742.09.80.01352017-04-23
CVE-2017-49552.09.80.00412017-06-13
CVE-2017-96152.09.80.00282017-06-26
CVE-2017-67092.09.80.00512017-07-06
CVE-2017-153662.09.80.00282017-10-26
CVE-2017-10001712.09.80.00332017-11-03