CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,511
Total CVEs
263
Critical
922
High
7.7
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
145
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 104
2 Google 75
3 Intel 58
4 Qualcomm 44
5 Apache 44
6 Adobe 42
7 Cisco 41
8 Huawei 40
9 Color 40
10 Reolink 36

All Improper Input Validation CVEs (1,511)

CVE-2026-0403
8.0

An insufficient input validation vulnerability in NETGEAR Orbi routers allows attackers on the local network to execute arbitrary OS commands through ...

Jan 13, 2026
CVE-2026-0404
8.0

An insufficient input validation vulnerability in NETGEAR Orbi routers' DHCPv6 functionality allows authenticated attackers on the same network (WiFi ...

Jan 13, 2026
CVE-2026-0406
8.0

An insufficient input validation vulnerability in NETGEAR XR1000v2 routers allows attackers on the local network to execute arbitrary operating system...

Jan 13, 2026
CVE-2026-0878
8.0

This CVE describes a sandbox escape vulnerability in the Graphics: CanvasWebGL component due to incorrect boundary conditions. It allows attackers to ...

Jan 13, 2026
CVE-2024-30092
8.0

This vulnerability allows an authenticated attacker on a guest virtual machine to execute arbitrary code on the Hyper-V host. It affects Windows syste...

Oct 8, 2024
CVE-2024-25290
8.0

This vulnerability allows remote attackers to execute arbitrary code on Casa Systems NL1901ACV VDSL modems by exploiting improper input validation in ...

May 2, 2024
CVE-2024-3646
8.0

A command injection vulnerability in GitHub Enterprise Server allows attackers with editor role access to the Management Console to execute arbitrary ...

Apr 19, 2024
CVE-2024-26240
8.0

CVE-2024-26240 is a Secure Boot security feature bypass vulnerability that allows attackers to bypass Secure Boot protections and load untrusted or ma...

Apr 9, 2024
CVE-2024-26189
8.0

CVE-2024-26189 is a Secure Boot security feature bypass vulnerability that allows attackers to circumvent Secure Boot protections on affected systems....

Apr 9, 2024
CVE-2024-1354
8.0

A command injection vulnerability in GitHub Enterprise Server allows authenticated users with editor role in the Management Console to execute arbitra...

Feb 13, 2024
CVE-2023-48311
8.0

This vulnerability in DockerSpawner allows JupyterHub users to launch any Docker image from public registries instead of being restricted to the confi...

Dec 8, 2023
CVE-2023-40062
8.0

This vulnerability in SolarWinds Platform allows a low-privileged authenticated user to execute arbitrary code with SYSTEM privileges due to incomplet...

Nov 1, 2023
CVE-2022-46303
8.0

This vulnerability allows authenticated users with User Management permissions (and LDAP administrators in some configurations) to inject arbitrary co...

Feb 20, 2023
CVE-2021-26631
8.0

CVE-2021-26631 is an improper input validation vulnerability in Mangboard commerce package that allows remote attackers to manipulate order amounts in...

May 19, 2022
CVE-2021-0126
8.0

This vulnerability in Intel Manageability Commander allows authenticated users on the same network to potentially escalate privileges through improper...

May 12, 2022
CVE-2020-7848
8.0

CVE-2020-7848 is a command injection vulnerability in EFM ipTIME C200 IP cameras that allows remote attackers to execute arbitrary operating system co...

Feb 17, 2021
CVE-2019-0720
8.0

This vulnerability allows an authenticated attacker on a Hyper-V guest virtual machine to execute arbitrary code on the host server by sending special...

Aug 14, 2019
CVE-2025-61916
7.9

Spinnaker versions prior to 2025.1.6, 2025.2.3, and 2025.3.0 are vulnerable to server-side request forgery (SSRF) that allows attackers to fetch data ...

Jan 5, 2026
CVE-2025-62525
7.9

Local users on affected OpenWrt systems can read and write arbitrary kernel memory through the ltq-ptm driver ioctls, allowing kernel privilege escala...

Oct 22, 2025
CVE-2024-52880
7.9

This vulnerability in InsydeH2O UEFI firmware allows attackers to bypass input validation in the VariableRuntimeDxe driver's SecureBootHandler. Attack...

May 15, 2025
CVE-2025-20032
7.9

This vulnerability in Intel PROSet/Wireless WiFi Software allows a privileged user (local administrator) to cause denial of service by exploiting impr...

May 13, 2025
CVE-2023-45745
7.9

This vulnerability in Intel TDX module software allows a privileged user on a local system to potentially escalate privileges due to improper input va...

May 16, 2024
CVE-2022-37336
7.9

This CVE describes an improper input validation vulnerability in BIOS firmware for certain Intel NUC devices. It allows a privileged user with local a...

Aug 11, 2023
CVE-2021-34417
7.9

This vulnerability allows remote command injection through the network proxy configuration page in Zoom's on-premise components. An authenticated web ...

Nov 11, 2021
CVE-2025-14963
7.8

A vulnerability in Trellix HX Agent's fekern.sys driver allows local attackers to escalate privileges and access lsass.exe memory via BYOVD techniques...

Feb 24, 2026
CVE-2026-24856
7.8

A memory corruption vulnerability in iccDEV library versions before 2.3.1.2 allows arbitrary code execution when processing malicious ICC color profil...

Jan 28, 2026
CVE-2025-48647
7.8

This vulnerability allows local attackers to escalate privileges on affected Android devices without user interaction. It affects Google Pixel devices...

Jan 16, 2026
CVE-2026-20951
7.8

This vulnerability allows an unauthorized attacker to execute arbitrary code on SharePoint servers through improper input validation. Organizations us...

Jan 13, 2026
CVE-2026-21678
7.8

CVE-2026-21678 is a heap-buffer-overflow vulnerability in the IccTagXml() function of iccDEV, a library for ICC color management profiles. It allows a...

Jan 7, 2026
CVE-2025-36932
7.8

This vulnerability allows local privilege escalation on affected Android devices through a memory overwrite in the tracepoint IPC handler. Attackers c...

Dec 11, 2025
CVE-2025-48632
7.8

This vulnerability in Android's AssociationRequest.java allows persistent CDM (Content Decryption Module) associations after user disassociation due t...

Dec 8, 2025
CVE-2025-48612
7.8

This vulnerability allows applications in a work profile to improperly set the main user's default NFC payment setting due to insufficient input valid...

Dec 8, 2025
CVE-2025-48525
7.8

This vulnerability in Android's DisassociationProcessor allows malicious apps to continue reading notifications after disassociation from a companion ...

Dec 8, 2025
CVE-2025-48566
7.8

This CVE describes an Android vulnerability where improper input validation allows bypassing user profile boundaries via forwarded intents. This enabl...

Dec 8, 2025
CVE-2025-59187
7.8

This Windows Kernel vulnerability allows authenticated attackers to gain elevated system privileges through improper input validation. It affects Wind...

Oct 14, 2025
CVE-2025-47314
7.8

This CVE describes a memory corruption vulnerability in Qualcomm FE driver components that could allow attackers to execute arbitrary code or cause de...

Sep 24, 2025
CVE-2025-10155
7.8

This vulnerability allows attackers to bypass security checks in picklescan by disguising malicious pickle files with PyTorch-related extensions. When...

Sep 17, 2025
CVE-2025-32322
7.8

This vulnerability allows a malicious app to obtain screen recording permissions without user consent due to improper input validation in Android's Me...

Sep 4, 2025
CVE-2025-48541
7.8

This vulnerability allows an attacker to remove biometric unlock (like face recognition) across user profiles on Android devices without proper authen...

Sep 4, 2025
CVE-2024-56190
7.8

This vulnerability allows local privilege escalation on affected Android devices through an out-of-bounds write in the Wi-Fi driver. Attackers can gai...

Sep 4, 2025
CVE-2025-50674
7.8

A privilege escalation vulnerability in OpenMediaVault's changePassword method allows local authenticated users to gain root privileges. This affects ...

Aug 22, 2025
CVE-2025-24486
7.8

This vulnerability allows an authenticated local user to potentially escalate privileges through improper input validation in Intel 700 Series Etherne...

Aug 12, 2025
CVE-2025-6377
7.8

A buffer overflow vulnerability in Rockwell Automation Arena allows remote code execution when a user opens a malicious DOE file. This affects Arena S...

Jul 9, 2025
CVE-2025-24005
7.8

This vulnerability allows a local attacker with SSH access to escalate privileges to root by exploiting improper input validation in a vulnerable scri...

Jul 8, 2025
CVE-2025-47968
7.8

CVE-2025-47968 is a local privilege escalation vulnerability in Microsoft AutoUpdate (MAU) caused by improper input validation. An authenticated attac...

Jun 10, 2025
CVE-2024-40458
7.8

A local privilege escalation vulnerability in Ocuco Innovation Tracking.exe version 2.10.24.51 allows attackers to gain elevated system privileges by ...

May 22, 2025
CVE-2025-32706
KEV 7.8

This vulnerability allows an authorized attacker with local access to exploit improper input validation in the Windows Common Log File System Driver t...

May 13, 2025
CVE-2025-31259
7.8

This CVE describes a privilege escalation vulnerability in macOS where improper input sanitization allows an application to gain elevated privileges. ...

May 12, 2025
CVE-2025-30442
7.8

A macOS privilege escalation vulnerability allows malicious applications to gain elevated system privileges through improper input sanitization. This ...

May 12, 2025
CVE-2024-49845
7.8

This vulnerability involves memory corruption during the FRS UDS generation process in Qualcomm components, potentially allowing attackers to execute ...

May 6, 2025

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,511 CVEs classified as CWE-20, with 263 rated critical and 922 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free