CWE-20: Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Yearly Trend
Top Affected Vendors
All Improper Input Validation CVEs (1,511)
CVE-2024-26151 is an input validation vulnerability in the mjml PyPI package that allows cross-site scripting (XSS) attacks when untrusted data is ins...
Feb 22, 2024This vulnerability in Zephyr RTOS Bluetooth stack allows unauthorized read/write access to Bluetooth characteristics that should require LE Secure Con...
Feb 19, 2024This vulnerability in Intel Server Board BIOS firmware allows a privileged user with local access to potentially escalate privileges through improper ...
Nov 14, 2023This vulnerability allows a privileged user with local access to potentially escalate privileges through improper input validation in Intel Server boa...
Nov 14, 2023This vulnerability in Intel NUC BIOS firmware allows a privileged user with local access to potentially escalate privileges through improper input val...
Aug 11, 2023This vulnerability allows a privileged user with local access to Intel NUC Rugged Kits, NUC Kits, and Compute Elements to potentially escalate privile...
Aug 11, 2023This vulnerability in Envoy proxy allows attackers to bypass security controls by using mixed-case HTTP/HTTPS schemes (like 'htTp' or 'htTps') in HTTP...
Jul 25, 2023This vulnerability allows local attackers to execute arbitrary code on Samsung mobile point-of-sale (mPOS) devices due to improper input validation in...
May 4, 2023Envoy proxy versions before 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 allow attackers to bypass JWT authentication by forging the x-envoy-original-pa...
Apr 4, 2023CVE-2022-24818 is a JNDI injection vulnerability in GeoTools that allows remote code execution when user-controlled JNDI strings are processed. Simila...
Apr 13, 2022This vulnerability in snapd allows malicious snaps to bypass strict confinement by injecting arbitrary AppArmor policy rules through malformed content...
Feb 17, 2022This CVE describes a memory corruption vulnerability in Reolink RLC-410W IP cameras that allows attackers to execute arbitrary code via specially craf...
Jan 28, 2022Apache XmlGraphics Commons versions 2.4 and earlier contain a server-side request forgery (SSRF) vulnerability in the XMPParser component. Attackers c...
Feb 24, 2021This vulnerability in RustFS allows attackers to bypass upload policy restrictions in presigned POST uploads, enabling unauthorized file uploads that ...
Feb 25, 2026This vulnerability allows an unauthorized attacker to execute arbitrary code on Windows Server Update Service (WSUS) servers by sending specially craf...
Jan 13, 2026This Server-side Request Forgery (SSRF) vulnerability in LibreChat allows authenticated users to craft malicious OpenAPI specifications that trick the...
Nov 29, 2025HCL iNotes has a reflected cross-site scripting vulnerability that allows attackers to execute malicious scripts in users' browsers by tricking them i...
Nov 25, 2025CVE-2025-65946 is a command injection vulnerability in Roo Code AI coding agent versions before 3.26.7. Due to improper validation, Roo could automati...
Nov 21, 2025This stored XSS vulnerability in Homarr allows attackers to execute arbitrary JavaScript in users' browsers by uploading a malicious SVG file, potenti...
Nov 19, 2025This vulnerability in the Microsoft JDBC Driver for SQL Server allows attackers to perform spoofing attacks by sending specially crafted input over a ...
Oct 14, 2025The WP JobHunt WordPress plugin has an Insecure Direct Object Reference vulnerability that allows authenticated attackers with Subscriber-level access...
Jul 22, 2025This CVE describes a PHP object injection vulnerability in the WooCommerce Recover Abandoned Cart WordPress plugin. Unauthenticated attackers can expl...
Mar 5, 2025This vulnerability allows attackers to spoof Microsoft Defender for Endpoint on Android, potentially tricking users into believing malicious apps are ...
Dec 12, 2024This vulnerability allows authenticated users with minimal viewing privileges in i-Educar school management software to escalate their privileges to A...
Aug 28, 2024This vulnerability in Apache DolphinScheduler allows authenticated users to read and write files they shouldn't have access to, potentially exposing s...
Aug 12, 2024The EvilVideo vulnerability in Telegram for Android allows attackers to send malicious applications disguised as video files. When users open these fi...
Jul 23, 2024This vulnerability in netty incubator codec.bhttp allows attackers to manipulate binary HTTP parsing to perform injection attacks. Attackers can achie...
Jul 18, 2024This vulnerability allows attackers to spoof email sender information in Outlook for Windows, making malicious emails appear to come from trusted sour...
Apr 9, 2024CVE-2024-28226 is an improper input validation vulnerability in OpenHarmony that allows remote attackers to cause denial of service (DoS) by sending s...
Apr 2, 2024ZITADEL authentication management software versions before 2.47.3, 2.46.1, 2.45.1, 2.44.3, 2.43.9, 2.42.15, and 2.41.15 contain a cross-site scripting...
Mar 18, 2024This vulnerability in Hydra (Cardano's scalability solution) allows a malicious head initializer to steal participant tokens (PTs) during protocol ini...
Oct 4, 2023This vulnerability in Hydra (Cardano's layer-2 solution) allows malicious participants to manipulate the contestation deadline during head closure. At...
Oct 4, 2023This path traversal vulnerability in OpenCart allows authenticated users with Log component modify privileges to delete arbitrary files on the server....
Sep 27, 2023This vulnerability in Visual Studio Tools for Office Runtime allows attackers to spoof file paths, potentially tricking users into opening malicious f...
Aug 8, 2023CVE-2023-38704 is a remote code execution vulnerability in import-in-the-middle, a module loading interceptor for ESM modules. It allows attackers to ...
Aug 7, 2023This CVE describes a command injection vulnerability in the 'Release PR Merged' GitHub Actions workflow of the taosdata/grafanaplugin repository. Atta...
Jun 6, 2023CLTPHP versions up to 6.0 contain an improper input validation vulnerability in the Template.php controller that allows attackers to execute arbitrary...
Apr 26, 2023CVE-2023-26067 is an input validation vulnerability in Lexmark device embedded web servers that allows remote code execution. Attackers can exploit th...
Apr 10, 2023Envoy proxy versions before 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 fail to properly sanitize request properties when generating headers, allowing ...
Apr 4, 2023This vulnerability in Splunk Enterprise allows higher-privileged users to bypass SPL safeguards for risky commands via the 'map' search command. It af...
Feb 14, 2023CVE-2022-2385 is a privilege escalation vulnerability in aws-iam-authenticator where allow-listed IAM identities can modify their usernames to gain un...
Jul 12, 2022CVE-2021-26617 is an input validation vulnerability in Firstmall that allows remote attackers to execute arbitrary code via the navercheckout_add func...
Feb 25, 2022CVE-2020-25717 is a privilege escalation vulnerability in Samba's domain user mapping mechanism. Authenticated attackers can exploit this flaw to gain...
Feb 18, 2022This vulnerability in Intel PROSet/Wireless WiFi and Killer WiFi drivers allows unauthenticated attackers on the same network to potentially cause den...
Feb 9, 2022CVE-2022-23623 is an input validation vulnerability in the Frourio TypeScript framework where validators fail to properly validate request bodies and ...
Feb 7, 2022CVE-2021-26612 is an improper input validation vulnerability in Nexacro platform's copy method that allows remote attackers to create arbitrary files ...
Nov 30, 2021This vulnerability in Intel PROSet/Wireless WiFi and Killer WiFi software for Windows 10 allows unauthenticated attackers on the same network to poten...
Nov 17, 2021CVE-2021-26607 is an improper input validation vulnerability in the execDefaultBrowser method of NEXACRO17 that allows remote attackers to execute arb...
Oct 26, 2021This vulnerability allows remote attackers to execute arbitrary operating system commands on MONITORAPP Application Insight Web Application Firewall (...
Aug 12, 2021This vulnerability allows an authorized attacker to exploit improper input validation in Power BI to execute arbitrary code remotely over a network. O...
Feb 10, 2026About Improper Input Validation (CWE-20)
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Our database tracks 1,511 CVEs classified as CWE-20, with 263 rated critical and 922 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.
External reference: View CWE-20 on MITRE CWE →
Monitor Improper Input Validation Vulnerabilities
Get alerted when new Improper Input Validation CVEs affect your infrastructure.
Start Monitoring Free