This vulnerability occurs when an application sends data to an external party, but accidentally includes sensitive information—like passwords, keys, or personal data—that the recipient should not be able to access.

This flaw often happens because of overly broad data selection or logging mechanisms that package more information than necessary for a given transaction. For example, an API response might return an entire user object, including internal fields like hashed passwords or security questions, instead of just the needed profile data. Developers should carefully review all data payloads sent to clients, third-party services, or logs, ensuring they follow the principle of least privilege and expose only what is explicitly required. Catching these leaks manually is challenging, as sensitive data can be buried deep in nested objects or only appear under specific conditions. While SAST tools can flag patterns of data exposure, Plexicus uses AI to analyze data flows in context and suggest precise code fixes—such as implementing stricter output filters or using data sanitization libraries—saving hours of manual review and reducing the risk of accidental disclosure across your entire application stack.
Impact: Read Files or DirectoriesRead MemoryRead Application Data
Sensitive data may be exposed to attackers.
Strategy: Separation of Privilege
sql