How to Fix Sensitive Data Exposure in Vue
Learn how to prevent and fix Sensitive Data Exposure vulnerabilities in Vue applications. Step-by-step guide with code examples, security checklists, and best practices.
What Is Sensitive Data Exposure?
Sensitive Data Exposure occurs when an application fails to adequately protect sensitive information during storage, transit, or processing. This includes personal data (names, emails, addresses), financial data (credit card numbers, bank accounts), health information, authentication credentials, API keys, and encryption keys.
The vulnerability manifests in many ways: transmitting data in clear text (HTTP instead of HTTPS); storing sensitive data unencrypted; using weak cryptographic algorithms; exposing API keys or secrets in client-side code or version control; including sensitive data in URLs or logs; caching sensitive responses; and leaking information through error messages, metadata, or timing attacks.
In modern JavaScript applications, a particularly common form of sensitive data exposure is accidentally including server-side secrets in client-side bundles. Environment variables prefixed with `NEXT_PUBLIC_` in Next.js or `VITE_` in Vite are embedded in the client bundle. Developers sometimes expose database URLs, service account keys, or internal API endpoints this way. Similarly, returning full database records (including sensitive fields) from API routes when the client only needs a subset of the data is a common oversight.
Why It Matters
Data exposure can lead to identity theft, financial fraud, and regulatory penalties. Under GDPR, organizations can face fines up to 4% of annual global turnover for data protection failures. HIPAA violations can result in fines up to $1.5 million per incident. Beyond regulatory consequences, data breaches severely damage user trust and brand reputation. Exposed credentials and API keys can be used to compromise connected systems, escalating the impact far beyond the initial exposure. Leaked secrets in public repositories are automatically harvested by bots within minutes.
How to Fix It in Vue
Classify data by sensitivity and apply appropriate protection for each level. Encrypt all data in transit using TLS 1.2+ (enforce HTTPS everywhere). Encrypt sensitive data at rest using AES-256 or equivalent. Never store sensitive data you do not need -- minimize data collection. Never expose secrets in client-side code or version control. Use environment variables for all secrets and rotate them regularly. Implement proper access controls on API responses -- only return the fields the client needs. Use Supabase RLS to enforce data access at the database level. Add secret scanning to your CI/CD pipeline (e.g., GitGuardian, truffleHog). Hash passwords with bcrypt/Argon2 and never store them as plain text.
Vue-Specific Advice
- Never use `v-html` with unsanitized user input. Vue's template interpolation `{{ }}` auto-escapes HTML, but `v-html` does not.
- Avoid using `eval()` or `new Function()` in Vue components. Use computed properties and watchers for dynamic behavior instead.
- Validate all props passed to components that render user-controlled content, especially in server-rendered (SSR) contexts.
- Use Vue Router's navigation guards to implement client-side route protection, but always enforce authorization on the server as well.
Vue Security Checklist for Sensitive Data Exposure
Vue Security Best Practices
Never use `v-html` with unsanitized user input. Vue's template interpolation `{{ }}` auto-escapes HTML, but `v-html` does not.
Avoid using `eval()` or `new Function()` in Vue components. Use computed properties and watchers for dynamic behavior instead.
Validate all props passed to components that render user-controlled content, especially in server-rendered (SSR) contexts.
Use Vue Router's navigation guards to implement client-side route protection, but always enforce authorization on the server as well.
Be cautious with Vue's `compile()` function, which can execute arbitrary code. Never pass user input to the template compiler.
Store sensitive configuration in environment variables prefixed per your build tool's convention (VITE_ for Vite) and never include secrets in client-side code.
Implement Content Security Policy headers to prevent inline script injection even if an XSS vulnerability exists.
Use Pinia stores carefully -- avoid storing sensitive data in state that persists across page navigations in SSR contexts.
Scan Your Vue App with SafeVibe
Stop guessing if your Vue app is vulnerable to Sensitive Data Exposure. Run an automated penetration test in minutes and get actionable results.
Start Free Scan