CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,511
Total CVEs
263
Critical
922
High
7.7
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
145
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 104
2 Google 75
3 Intel 58
4 Qualcomm 44
5 Apache 44
6 Adobe 42
7 Cisco 41
8 Huawei 40
9 Color 40
10 Reolink 36

All Improper Input Validation CVEs (1,511)

CVE-2024-26151
8.2

CVE-2024-26151 is an input validation vulnerability in the mjml PyPI package that allows cross-site scripting (XSS) attacks when untrusted data is ins...

Feb 22, 2024
CVE-2024-1638
8.2

This vulnerability in Zephyr RTOS Bluetooth stack allows unauthorized read/write access to Bluetooth characteristics that should require LE Secure Con...

Feb 19, 2024
CVE-2023-34431
8.2

This vulnerability in Intel Server Board BIOS firmware allows a privileged user with local access to potentially escalate privileges through improper ...

Nov 14, 2023
CVE-2022-33945
8.2

This vulnerability allows a privileged user with local access to potentially escalate privileges through improper input validation in Intel Server boa...

Nov 14, 2023
CVE-2023-34086
8.2

This vulnerability in Intel NUC BIOS firmware allows a privileged user with local access to potentially escalate privileges through improper input val...

Aug 11, 2023
CVE-2023-32617
8.2

This vulnerability allows a privileged user with local access to Intel NUC Rugged Kits, NUC Kits, and Compute Elements to potentially escalate privile...

Aug 11, 2023
CVE-2023-35944
8.2

This vulnerability in Envoy proxy allows attackers to bypass security controls by using mixed-case HTTP/HTTPS schemes (like 'htTp' or 'htTps') in HTTP...

Jul 25, 2023
CVE-2023-21501
8.2

This vulnerability allows local attackers to execute arbitrary code on Samsung mobile point-of-sale (mPOS) devices due to improper input validation in...

May 4, 2023
CVE-2023-27487
8.2

Envoy proxy versions before 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 allow attackers to bypass JWT authentication by forging the x-envoy-original-pa...

Apr 4, 2023
CVE-2022-24818
8.2

CVE-2022-24818 is a JNDI injection vulnerability in GeoTools that allows remote code execution when user-controlled JNDI strings are processed. Simila...

Apr 13, 2022
CVE-2021-4120
8.2

This vulnerability in snapd allows malicious snaps to bypass strict confinement by injecting arbitrary AppArmor policy rules through malformed content...

Feb 17, 2022
CVE-2022-21796
8.2

This CVE describes a memory corruption vulnerability in Reolink RLC-410W IP cameras that allows attackers to execute arbitrary code via specially craf...

Jan 28, 2022
CVE-2020-11988
8.2

Apache XmlGraphics Commons versions 2.4 and earlier contain a server-side request forgery (SSRF) vulnerability in the XMPParser component. Attackers c...

Feb 24, 2021
CVE-2026-27607
8.1

This vulnerability in RustFS allows attackers to bypass upload policy restrictions in presigned POST uploads, enabling unauthorized file uploads that ...

Feb 25, 2026
CVE-2026-20856
8.1

This vulnerability allows an unauthorized attacker to execute arbitrary code on Windows Server Update Service (WSUS) servers by sending specially craf...

Jan 13, 2026
CVE-2025-66201
8.1

This Server-side Request Forgery (SSRF) vulnerability in LibreChat allows authenticated users to craft malicious OpenAPI specifications that trick the...

Nov 29, 2025
CVE-2025-0248
8.1

HCL iNotes has a reflected cross-site scripting vulnerability that allows attackers to execute malicious scripts in users' browsers by tricking them i...

Nov 25, 2025
CVE-2025-65946
8.1

CVE-2025-65946 is a command injection vulnerability in Roo Code AI coding agent versions before 3.26.7. Due to improper validation, Roo could automati...

Nov 21, 2025
CVE-2025-64759
8.1

This stored XSS vulnerability in Homarr allows attackers to execute arbitrary JavaScript in users' browsers by uploading a malicious SVG file, potenti...

Nov 19, 2025
CVE-2025-59250
8.1

This vulnerability in the Microsoft JDBC Driver for SQL Server allows attackers to perform spoofing attacks by sending specially crafted input over a ...

Oct 14, 2025
CVE-2025-6585
8.1

The WP JobHunt WordPress plugin has an Insecure Direct Object Reference vulnerability that allows authenticated attackers with Subscriber-level access...

Jul 22, 2025
CVE-2025-0956
8.1

This CVE describes a PHP object injection vulnerability in the WooCommerce Recover Abandoned Cart WordPress plugin. Unauthenticated attackers can expl...

Mar 5, 2025
CVE-2024-49057
8.1

This vulnerability allows attackers to spoof Microsoft Defender for Endpoint on Android, potentially tricking users into believing malicious apps are ...

Dec 12, 2024
CVE-2024-45058
8.1

This vulnerability allows authenticated users with minimal viewing privileges in i-Educar school management software to escalate their privileges to A...

Aug 28, 2024
CVE-2024-30188
8.1

This vulnerability in Apache DolphinScheduler allows authenticated users to read and write files they shouldn't have access to, potentially exposing s...

Aug 12, 2024
CVE-2024-7014
EPSS 17.5% 8.1

The EvilVideo vulnerability in Telegram for Android allows attackers to send malicious applications disguised as video files. When users open these fi...

Jul 23, 2024
CVE-2024-40642
8.1

This vulnerability in netty incubator codec.bhttp allows attackers to manipulate binary HTTP parsing to perform injection attacks. Attackers can achie...

Jul 18, 2024
CVE-2024-20670
8.1

This vulnerability allows attackers to spoof email sender information in Outlook for Windows, making malicious emails appear to come from trusted sour...

Apr 9, 2024
CVE-2024-28226
8.1

CVE-2024-28226 is an improper input validation vulnerability in OpenHarmony that allows remote attackers to cause denial of service (DoS) by sending s...

Apr 2, 2024
CVE-2024-28855
8.1

ZITADEL authentication management software versions before 2.47.3, 2.46.1, 2.45.1, 2.44.3, 2.43.9, 2.42.15, and 2.41.15 contain a cross-site scripting...

Mar 18, 2024
CVE-2023-42449
8.1

This vulnerability in Hydra (Cardano's scalability solution) allows a malicious head initializer to steal participant tokens (PTs) during protocol ini...

Oct 4, 2023
CVE-2023-42448
8.1

This vulnerability in Hydra (Cardano's layer-2 solution) allows malicious participants to manipulate the contestation deadline during head closure. At...

Oct 4, 2023
CVE-2023-2315
8.1

This path traversal vulnerability in OpenCart allows authenticated users with Log component modify privileges to delete arbitrary files on the server....

Sep 27, 2023
CVE-2023-36897
8.1

This vulnerability in Visual Studio Tools for Office Runtime allows attackers to spoof file paths, potentially tricking users into opening malicious f...

Aug 8, 2023
CVE-2023-38704
8.1

CVE-2023-38704 is a remote code execution vulnerability in import-in-the-middle, a module loading interceptor for ESM modules. It allows attackers to ...

Aug 7, 2023
CVE-2023-34111
8.1

This CVE describes a command injection vulnerability in the 'Release PR Merged' GitHub Actions workflow of the taosdata/grafanaplugin repository. Atta...

Jun 6, 2023
CVE-2023-30269
8.1

CLTPHP versions up to 6.0 contain an improper input validation vulnerability in the Template.php controller that allows attackers to execute arbitrary...

Apr 26, 2023
CVE-2023-26067
8.1

CVE-2023-26067 is an input validation vulnerability in Lexmark device embedded web servers that allows remote code execution. Attackers can exploit th...

Apr 10, 2023
CVE-2023-27493
8.1

Envoy proxy versions before 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 fail to properly sanitize request properties when generating headers, allowing ...

Apr 4, 2023
CVE-2023-22939
8.1

This vulnerability in Splunk Enterprise allows higher-privileged users to bypass SPL safeguards for risky commands via the 'map' search command. It af...

Feb 14, 2023
CVE-2022-2385
8.1

CVE-2022-2385 is a privilege escalation vulnerability in aws-iam-authenticator where allow-listed IAM identities can modify their usernames to gain un...

Jul 12, 2022
CVE-2021-26617
8.1

CVE-2021-26617 is an input validation vulnerability in Firstmall that allows remote attackers to execute arbitrary code via the navercheckout_add func...

Feb 25, 2022
CVE-2020-25717
8.1

CVE-2020-25717 is a privilege escalation vulnerability in Samba's domain user mapping mechanism. Authenticated attackers can exploit this flaw to gain...

Feb 18, 2022
CVE-2021-33113
8.1

This vulnerability in Intel PROSet/Wireless WiFi and Killer WiFi drivers allows unauthenticated attackers on the same network to potentially cause den...

Feb 9, 2022
CVE-2022-23623
8.1

CVE-2022-23623 is an input validation vulnerability in the Frourio TypeScript framework where validators fail to properly validate request bodies and ...

Feb 7, 2022
CVE-2021-26612
8.1

CVE-2021-26612 is an improper input validation vulnerability in Nexacro platform's copy method that allows remote attackers to create arbitrary files ...

Nov 30, 2021
CVE-2021-0078
8.1

This vulnerability in Intel PROSet/Wireless WiFi and Killer WiFi software for Windows 10 allows unauthenticated attackers on the same network to poten...

Nov 17, 2021
CVE-2021-26607
8.1

CVE-2021-26607 is an improper input validation vulnerability in the execDefaultBrowser method of NEXACRO17 that allows remote attackers to execute arb...

Oct 26, 2021
CVE-2021-36982
8.1

This vulnerability allows remote attackers to execute arbitrary operating system commands on MONITORAPP Application Insight Web Application Firewall (...

Aug 12, 2021
CVE-2026-21229
8.0

This vulnerability allows an authorized attacker to exploit improper input validation in Power BI to execute arbitrary code remotely over a network. O...

Feb 10, 2026

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,511 CVEs classified as CWE-20, with 263 rated critical and 922 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free