CWE-20: Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Yearly Trend
Top Affected Vendors
All Improper Input Validation CVEs (1,462)
CVE-2026-0848 allows arbitrary code execution in NLTK versions <=3.9.2 due to improper input validation in the StanfordSegmenter module. Attackers can...
Mar 5, 2026This vulnerability in n8n workflow automation platform allows unauthenticated remote attackers to execute certain form-based workflows that can access...
Jan 8, 2026An unauthenticated remote attacker can execute arbitrary system commands with root privileges on Cisco Secure Email Gateway and Cisco Secure Email and...
Dec 17, 2025This critical vulnerability in Intel Neural Compressor software allows unauthenticated remote attackers to execute arbitrary code with elevated privil...
May 16, 2024CVE-2024-3400 is a critical command injection vulnerability in Palo Alto Networks PAN-OS GlobalProtect feature that allows unauthenticated attackers t...
Apr 12, 2024This critical vulnerability in D-Link D-View 8 allows attackers to manipulate the probe inventory, potentially leading to information disclosure from ...
Dec 28, 2023This critical vulnerability in GLPI allows attackers to upload malicious PHP files to unauthorized directories through unverified object instantiation...
Nov 2, 2023This CVE describes a critical CSRF vulnerability in the Fiber web framework for Go that allows attackers to forge malicious requests on behalf of user...
Oct 16, 2023CVE-2022-47190 allows remote attackers to upload malicious firmware containing a webshell to Generex UPS CS141 devices, enabling arbitrary code execut...
Mar 31, 2023CVE-2021-44228 (Log4Shell) is a critical remote code execution vulnerability in Apache Log4j2 that allows attackers to execute arbitrary code by explo...
Dec 10, 2021CVE-2021-21321 is a path traversal vulnerability in fastify-reply-from npm package that allows attackers to bypass URL prefix restrictions when proxyi...
Mar 2, 2021This CVE describes a critical server-side JavaScript injection vulnerability in Budibase Cloud (SaaS) that allows any authenticated user to execute ar...
Feb 25, 2026A command injection vulnerability in Wrangler's `pages deploy` command allows attackers who control the `--commit-hash` parameter to execute arbitrary...
Jan 20, 2026CVE-2026-23836 is a critical remote code execution vulnerability in HotCRP conference review software. It allows authenticated users to execute arbitr...
Jan 19, 2026An improper input validation vulnerability in Avaya Call Management System allows remote attackers to execute arbitrary commands via specially crafted...
Jun 10, 2025A privilege escalation vulnerability in Gardener allows project administrators to gain control over seed clusters managing their shoot clusters. This ...
May 19, 2025A privilege escalation vulnerability in Gardener External DNS Management allows users with administrative privileges at the project or shoot cluster l...
May 19, 2025This CVE describes multiple Poisoned Pipeline Execution vulnerabilities in the arduino-esp32 GitHub Actions CI/CD workflow. Attackers could inject mal...
Sep 17, 2024Discord-Recon, a Discord bot for bug bounty automation, is vulnerable to remote code execution (RCE) allowing attackers to execute shell commands on t...
Jan 9, 2024This vulnerability allows attackers to execute arbitrary code with SYSTEM permissions on Windows systems running 1E End-User Interaction product pack....
Nov 6, 2023This vulnerability allows attackers to execute arbitrary code with SYSTEM privileges on Windows systems running the vulnerable 1E-Exchange-URLResponse...
Nov 6, 2023This CVE describes a command injection vulnerability in Honeywell PM43 printers' web interface modules. Attackers can execute arbitrary commands on af...
Sep 12, 2023CVE-2023-25915 is a critical remote code execution vulnerability affecting Fortra's GoAnywhere MFT software. Authenticated attackers can exploit impro...
Aug 21, 2023CVE-2023-27586 is a server-side request forgery (SSRF) vulnerability in CairoSVG that allows attackers to make unauthorized network requests from vuln...
Mar 20, 2023Databasir 1.01 has a remote code execution vulnerability where JDBC drivers uploaded by users are not validated before use. This allows any authentica...
Apr 20, 2022CVE-2021-43779 is an authenticated remote code execution vulnerability in the GLPI addressing plugin that allows attackers with valid credentials to e...
Jan 5, 2022This vulnerability in Cisco Jabber for Windows allows authenticated remote attackers to execute arbitrary code by sending specially crafted XMPP messa...
Sep 4, 2020CVE-2026-27590 is a path confusion vulnerability in Caddy server's FastCGI handling that occurs when processing Unicode characters in request paths. A...
Feb 24, 2026An unauthenticated remote attacker can write arbitrary data to any file on Asustor ADM systems when a specific function is enabled during AD Domain jo...
Feb 3, 2026This CVE describes a vulnerability in the ROOT data analysis framework's built-in zlib modules, specifically in the inffast.C program files. The vulne...
Jan 27, 2026CVE-2026-21675 is a use-after-free vulnerability in iccDEV's CIccXform::Create() function that can lead to arbitrary code execution. This affects appl...
Jan 6, 2026CVE-2025-8769 is a critical remote code execution vulnerability in Telenium Online Web Application. Attackers can inject arbitrary Perl code through c...
Dec 24, 2025This vulnerability allows unauthenticated attackers to create new user accounts with administrator privileges in WordPress sites using the Fox LMS plu...
Dec 15, 2025This vulnerability allows authenticated attackers to execute arbitrary commands with root privileges on DB Electronica Telecomunicazioni Mozart FM Tra...
Nov 26, 2025This vulnerability allows remote attackers to execute arbitrary commands with root privileges on QVidium Opera11 devices by sending a malicious GET re...
Nov 19, 2025This vulnerability allows unauthenticated attackers to upload malicious files to arbitrary locations on TRUfusion Enterprise servers via path traversa...
Oct 27, 2025CVE-2025-12285 is a missing initial password change vulnerability affecting BLU-IC2 and BLU-IC4 devices. This allows attackers to access systems using...
Oct 26, 2025This vulnerability allows attackers to manipulate mail configuration files and execute arbitrary commands on affected BLU-IC2 and BLU-IC4 devices. Att...
Oct 26, 2025Ericsson Indoor Connect 8855 has an improper input validation vulnerability that allows attackers to execute arbitrary commands with escalated privile...
Sep 25, 2025This vulnerability in Apple's Safari browser and related operating systems allows processing malicious web content to cause unexpected process crashes...
Sep 15, 2025An input validation vulnerability in Apple operating systems allows attackers to execute arbitrary code or cause denial of service by sending speciall...
Sep 15, 2025This CVE describes a critical command injection vulnerability in Hoverfly's middleware API endpoint that allows remote code execution. Attackers can e...
Sep 10, 2025This vulnerability in Apache CXF allows untrusted users who can configure JMS endpoints to use RMI or LDAP URLs, potentially leading to remote code ex...
Aug 8, 2025This CVE describes an improper input validation vulnerability in UniFi Access devices that allows command injection. An attacker with network access t...
Aug 4, 2025CVE-2025-50578 allows unauthenticated attackers to manipulate HTTP headers (X-Forwarded-Host and Referer) to perform Host Header Injection and Open Re...
Jul 30, 2025This vulnerability allows malicious applications to bypass security restrictions and execute arbitrary binaries on macOS devices. It affects macOS sys...
Jul 30, 2025This CVE describes memory corruption vulnerabilities in Apple's graphics processing that could allow arbitrary code execution. Attackers can exploit t...
Jul 30, 2025This CVE describes a critical SQL injection vulnerability in XWiki Platform that allows attackers to execute arbitrary SQL queries on Oracle databases...
Jul 26, 2025This critical vulnerability allows unauthenticated attackers to execute arbitrary code with system privileges on affected D-Link devices by sending a ...
Jul 25, 2025This vulnerability allows unauthenticated remote attackers to upload arbitrary files, including malicious PHP scripts, to Tiki Wiki CMS Groupware serv...
Jul 15, 2025About Improper Input Validation (CWE-20)
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Our database tracks 1,462 CVEs classified as CWE-20, with 248 rated critical and 888 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.
External reference: View CWE-20 on MITRE CWE →
Monitor Improper Input Validation Vulnerabilities
Get alerted when new Improper Input Validation CVEs affect your infrastructure.
Start Monitoring Free