CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,497
Total CVEs
258
Critical
913
High
7.7
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
145
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 100
2 Google 74
3 Intel 58
4 Qualcomm 44
5 Apache 44
6 Adobe 42
7 Color 40
8 Huawei 39
9 Reolink 36
10 Cisco 36

All Improper Input Validation CVEs (1,497)

CVE-2026-0848
10.0

CVE-2026-0848 allows arbitrary code execution in NLTK versions <=3.9.2 due to improper input validation in the StanfordSegmenter module. Attackers can...

Mar 5, 2026
CVE-2026-21858
10.0

This vulnerability in n8n workflow automation platform allows unauthenticated remote attackers to execute certain form-based workflows that can access...

Jan 8, 2026
CVE-2025-20393
KEV 10.0

An unauthenticated remote attacker can execute arbitrary system commands with root privileges on Cisco Secure Email Gateway and Cisco Secure Email and...

Dec 17, 2025
CVE-2024-22476
10.0

This critical vulnerability in Intel Neural Compressor software allows unauthenticated remote attackers to execute arbitrary code with elevated privil...

May 16, 2024
CVE-2024-3400
10.0

CVE-2024-3400 is a critical command injection vulnerability in Palo Alto Networks PAN-OS GlobalProtect feature that allows unauthenticated attackers t...

Apr 12, 2024
CVE-2023-7163
10.0

This critical vulnerability in D-Link D-View 8 allows attackers to manipulate the probe inventory, potentially leading to information disclosure from ...

Dec 28, 2023
CVE-2023-42802
10.0

This critical vulnerability in GLPI allows attackers to upload malicious PHP files to unauthorized directories through unverified object instantiation...

Nov 2, 2023
CVE-2023-45128
10.0

This CVE describes a critical CSRF vulnerability in the Fiber web framework for Go that allows attackers to forge malicious requests on behalf of user...

Oct 16, 2023
CVE-2022-47190
10.0

CVE-2022-47190 allows remote attackers to upload malicious firmware containing a webshell to Generex UPS CS141 devices, enabling arbitrary code execut...

Mar 31, 2023
CVE-2021-44228
10.0

CVE-2021-44228 (Log4Shell) is a critical remote code execution vulnerability in Apache Log4j2 that allows attackers to execute arbitrary code by explo...

Dec 10, 2021
CVE-2021-21321
10.0

CVE-2021-21321 is a path traversal vulnerability in fastify-reply-from npm package that allows attackers to bypass URL prefix restrictions when proxyi...

Mar 2, 2021
CVE-2026-27702
9.9

This CVE describes a critical server-side JavaScript injection vulnerability in Budibase Cloud (SaaS) that allows any authenticated user to execute ar...

Feb 25, 2026
CVE-2026-0933
9.9

A command injection vulnerability in Wrangler's `pages deploy` command allows attackers who control the `--commit-hash` parameter to execute arbitrary...

Jan 20, 2026
CVE-2026-23836
9.9

CVE-2026-23836 is a critical remote code execution vulnerability in HotCRP conference review software. It allows authenticated users to execute arbitr...

Jan 19, 2026
CVE-2025-1041
9.9

An improper input validation vulnerability in Avaya Call Management System allows remote attackers to execute arbitrary commands via specially crafted...

Jun 10, 2025
CVE-2025-47283
9.9

A privilege escalation vulnerability in Gardener allows project administrators to gain control over seed clusters managing their shoot clusters. This ...

May 19, 2025
CVE-2025-47282
9.9

A privilege escalation vulnerability in Gardener External DNS Management allows users with administrative privileges at the project or shoot cluster l...

May 19, 2025
CVE-2024-45798
9.9

This CVE describes multiple Poisoned Pipeline Execution vulnerabilities in the arduino-esp32 GitHub Actions CI/CD workflow. Attackers could inject mal...

Sep 17, 2024
CVE-2024-21663
9.9

Discord-Recon, a Discord bot for bug bounty automation, is vulnerable to remote code execution (RCE) allowing attackers to execute shell commands on t...

Jan 9, 2024
CVE-2023-5964
9.9

This vulnerability allows attackers to execute arbitrary code with SYSTEM permissions on Windows systems running 1E End-User Interaction product pack....

Nov 6, 2023
CVE-2023-45161
9.9

This vulnerability allows attackers to execute arbitrary code with SYSTEM privileges on Windows systems running the vulnerable 1E-Exchange-URLResponse...

Nov 6, 2023
CVE-2023-3710
9.9

This CVE describes a command injection vulnerability in Honeywell PM43 printers' web interface modules. Attackers can execute arbitrary commands on af...

Sep 12, 2023
CVE-2023-25915
9.9

CVE-2023-25915 is a critical remote code execution vulnerability affecting Fortra's GoAnywhere MFT software. Authenticated attackers can exploit impro...

Aug 21, 2023
CVE-2023-27586
9.9

CVE-2023-27586 is a server-side request forgery (SSRF) vulnerability in CairoSVG that allows attackers to make unauthorized network requests from vuln...

Mar 20, 2023
CVE-2022-24861
9.9

Databasir 1.01 has a remote code execution vulnerability where JDBC drivers uploaded by users are not validated before use. This allows any authentica...

Apr 20, 2022
CVE-2021-43779
9.9

CVE-2021-43779 is an authenticated remote code execution vulnerability in the GLPI addressing plugin that allows attackers with valid credentials to e...

Jan 5, 2022
CVE-2020-3495
9.9

This vulnerability in Cisco Jabber for Windows allows authenticated remote attackers to execute arbitrary code by sending specially crafted XMPP messa...

Sep 4, 2020
CVE-2026-27590
9.8

CVE-2026-27590 is a path confusion vulnerability in Caddy server's FastCGI handling that occurs when processing Unicode characters in request paths. A...

Feb 24, 2026
CVE-2026-24936
9.8

An unauthenticated remote attacker can write arbitrary data to any file on Asustor ADM systems when a specific function is enabled during AD Domain jo...

Feb 3, 2026
CVE-2026-24811
9.8

This CVE describes a vulnerability in the ROOT data analysis framework's built-in zlib modules, specifically in the inffast.C program files. The vulne...

Jan 27, 2026
CVE-2026-21675
9.8

CVE-2026-21675 is a use-after-free vulnerability in iccDEV's CIccXform::Create() function that can lead to arbitrary code execution. This affects appl...

Jan 6, 2026
CVE-2025-8769
9.8

CVE-2025-8769 is a critical remote code execution vulnerability in Telenium Online Web Application. Attackers can inject arbitrary Perl code through c...

Dec 24, 2025
CVE-2025-14156
9.8

This vulnerability allows unauthenticated attackers to create new user accounts with administrator privileges in WordPress sites using the Fox LMS plu...

Dec 15, 2025
CVE-2025-66259
9.8

This vulnerability allows authenticated attackers to execute arbitrary commands with root privileges on DB Electronica Telecomunicazioni Mozart FM Tra...

Nov 26, 2025
CVE-2025-63213
9.8

This vulnerability allows remote attackers to execute arbitrary commands with root privileges on QVidium Opera11 devices by sending a malicious GET re...

Nov 19, 2025
CVE-2025-27224
9.8

This vulnerability allows unauthenticated attackers to upload malicious files to arbitrary locations on TRUfusion Enterprise servers via path traversa...

Oct 27, 2025
CVE-2025-12285
9.8

CVE-2025-12285 is a missing initial password change vulnerability affecting BLU-IC2 and BLU-IC4 devices. This allows attackers to access systems using...

Oct 26, 2025
CVE-2025-12275
9.8

This vulnerability allows attackers to manipulate mail configuration files and execute arbitrary commands on affected BLU-IC2 and BLU-IC4 devices. Att...

Oct 26, 2025
CVE-2025-40836
9.8

Ericsson Indoor Connect 8855 has an improper input validation vulnerability that allows attackers to execute arbitrary commands with escalated privile...

Sep 25, 2025
CVE-2025-43342
9.8

This vulnerability in Apple's Safari browser and related operating systems allows processing malicious web content to cause unexpected process crashes...

Sep 15, 2025
CVE-2025-43347
9.8

An input validation vulnerability in Apple operating systems allows attackers to execute arbitrary code or cause denial of service by sending speciall...

Sep 15, 2025
CVE-2025-54123
EPSS 40.5% 9.8

This CVE describes a critical command injection vulnerability in Hoverfly's middleware API endpoint that allows remote code execution. Attackers can e...

Sep 10, 2025
CVE-2025-48913
9.8

This vulnerability in Apache CXF allows untrusted users who can configure JMS endpoints to use RMI or LDAP URLs, potentially leading to remote code ex...

Aug 8, 2025
CVE-2025-27212
9.8

This CVE describes an improper input validation vulnerability in UniFi Access devices that allows command injection. An attacker with network access t...

Aug 4, 2025
CVE-2025-50578
9.8

CVE-2025-50578 allows unauthenticated attackers to manipulate HTTP headers (X-Forwarded-Host and Referer) to perform Host Header Injection and Open Re...

Jul 30, 2025
CVE-2025-43253
9.8

This vulnerability allows malicious applications to bypass security restrictions and execute arbitrary binaries on macOS devices. It affects macOS sys...

Jul 30, 2025
CVE-2025-43234
9.8

This CVE describes memory corruption vulnerabilities in Apple's graphics processing that could allow arbitrary code execution. Attackers can exploit t...

Jul 30, 2025
CVE-2025-54385
9.8

This CVE describes a critical SQL injection vulnerability in XWiki Platform that allows attackers to execute arbitrary SQL queries on Oracle databases...

Jul 26, 2025
CVE-2014-125117
EPSS 48.5% 9.8

This critical vulnerability allows unauthenticated attackers to execute arbitrary code with system privileges on affected D-Link devices by sending a ...

Jul 25, 2025
CVE-2025-34111
EPSS 70.9% 9.8

This vulnerability allows unauthenticated remote attackers to upload arbitrary files, including malicious PHP scripts, to Tiki Wiki CMS Groupware serv...

Jul 15, 2025

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,497 CVEs classified as CWE-20, with 258 rated critical and 913 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free