CWE-20: Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Yearly Trend
Top Affected Vendors
All Improper Input Validation CVEs (1,542)
This CVE describes an Improper Input Validation vulnerability in Adobe Commerce that allows authenticated admin attackers to read arbitrary files from...
Oct 10, 2024This vulnerability in Qualcomm Core services allows information disclosure when processing Diag commands. Attackers could potentially access sensitive...
Jan 2, 2024A critical input validation flaw in TOBY-L2 cellular modules allows attackers with physical serial access to execute arbitrary operating system comman...
Dec 20, 2023This vulnerability allows attackers to elevate privileges on systems running affected .NET, .NET Framework, and Visual Studio versions. An authenticat...
Nov 14, 2023This CVE allows attackers to inject malicious annotations into Ingress nginx configurations, leading to arbitrary command execution on the host system...
Oct 25, 2023CVE-2023-32721 is a stored cross-site scripting (XSS) vulnerability in Zabbix's web application that allows attackers to inject malicious scripts into...
Oct 12, 2023CVE-2021-25745 is a vulnerability in ingress-nginx where users with permissions to create or update Ingress objects can exploit the path field to obta...
May 6, 2022This CVE describes an improper boundary check vulnerability in Samsung's UWB (Ultra-Wideband) firmware that allows attackers to write arbitrary memory...
Apr 11, 2022CVE-2021-29462 is a DNS rebinding vulnerability in the Portable SDK for UPnP Devices (libupnp) that allows attackers to bypass same-origin policy rest...
Apr 20, 2021This vulnerability in the sopel-channelmgnt plugin allows attackers to bypass restrictions and kick the bot from IRC channels when kicking multiple us...
Apr 9, 2021This vulnerability in Koa.js allows attackers to inject malicious hostnames via specially crafted HTTP Host headers containing '@' symbols. Applicatio...
Feb 26, 2026A protocol compliance vulnerability in free5GC's UPF component allows remote attackers to send malformed PFCP Association Setup Requests that violate ...
Feb 13, 2026Adminer v5.4.1 and earlier has a version check endpoint that lacks origin validation, allowing attackers to send malformed POST data. This causes a PH...
Feb 9, 2026A vulnerability in fast-xml-parser versions 4.3.6 through 5.3.3 allows attackers to cause denial of service by sending XML with out-of-range numeric e...
Jan 30, 2026This vulnerability in Undertow allows remote attackers to cause denial-of-service by sending HTTP requests with large parameter names, triggering OutO...
Jan 30, 2026An input validation vulnerability in OneFlow's oneflow.index_add component allows attackers to trigger a Denial of Service (DoS) by sending specially ...
Jan 28, 2026An input validation vulnerability in OneFlow's flow.arange() function allows attackers to trigger a Denial of Service (DoS) by sending specially craft...
Jan 28, 2026A vulnerability in ollama's GGUF decoder allows remote attackers to trigger a denial of service by sending specially crafted input. This affects all s...
Jan 21, 2026A vulnerability in ollama v0.12.10 allows remote attackers to cause denial of service by sending specially crafted GGUF files. The readGGUFV1String fu...
Jan 21, 2026An input validation vulnerability in Pithikos websocket-server v0.6.4 allows remote attackers to trigger unexpected server behavior or potentially lea...
Jan 20, 2026Quicly, an IETF QUIC protocol implementation, contains assertion failures that allow remote attackers to trigger denial-of-service crashes. Systems us...
Jan 19, 2026A remote, unauthenticated attacker can exploit a null pointer dereference vulnerability in the TP-Link TL-WR841N v14 web portal's referer header check...
Jan 15, 2026This vulnerability in RustCrypto's elliptic-curves library allows attackers to cause denial-of-service by sending specially crafted SM2 encrypted mess...
Jan 10, 2026A denial-of-service vulnerability exists in RustCrypto's SM2 public-key encryption implementation where untrusted ciphertext can trigger bounds-check ...
Jan 10, 2026OpenAirInterface CN5G AMF versions up to v2.0.1 contain a logical error in JSON request processing that allows unauthenticated remote attackers to sen...
Jan 7, 2026CVE-2025-15358 is a denial of service vulnerability in Delta Electronics DVP-12SE11T programmable logic controllers. Attackers can send specially craf...
Dec 30, 2025A vulnerability in BinUtils' cp-demangle.c allows attackers to cause denial of service through crafted PE files. This affects systems using BinUtils f...
Dec 29, 2025A vulnerability in BinUtils' cp-demangle.c allows attackers to cause denial of service through crafted PE files. This affects systems using BinUtils f...
Dec 29, 2025A vulnerability in free5GC's LocalNode.Sess function allows attackers to send crafted PFCP Session Modification Requests with malicious Local SEID hea...
Dec 18, 2025This vulnerability in Homarr allows privilege escalation and unauthorized access to other users' groups through crafted LDAP search queries due to ins...
Dec 17, 2025A mail header parsing vulnerability in Apple operating systems allows attackers to cause persistent denial-of-service conditions. This affects users o...
Dec 12, 2025This vulnerability in Microsoft Exchange Server allows authenticated attackers to elevate their privileges through improper input validation. Attacker...
Dec 9, 2025This vulnerability in NETGEAR Nighthawk routers allows attackers on the WAN side to execute commands by manipulating DNS responses during speedtests. ...
Dec 9, 2025An improper input validation vulnerability in Infinera MTC-9 allows remote unauthenticated attackers to send crafted XML payloads that crash the servi...
Dec 8, 2025This vulnerability in Undertow allows remote attackers to cause denial of service by sending specially crafted large form data with application/x-www-...
Dec 3, 2025This vulnerability in Ceph's RGW (RADOS Gateway) allows attackers to cause a denial-of-service by sending a specific S3 API request with an empty stri...
Nov 12, 2025An improper input validation vulnerability in NETGEAR R6260 and R6850 routers allows unauthenticated attackers on the local network who can perform ma...
Nov 11, 2025CVE-2025-59595 is a denial of service vulnerability in Secure Access versions before 14.12 where an attacker can send a specially crafted packet to cr...
Nov 4, 2025This CVE describes a denial-of-service vulnerability in macOS that was addressed through improved input validation. Remote attackers could potentially...
Nov 4, 2025CVE-2025-60938 is a remote code execution vulnerability in Emoncms 11.7.3 that allows authenticated users to execute arbitrary commands on the target ...
Oct 24, 2025A vulnerability in Samsung Exynos processors' L2 layer incorrectly handles RLC AM PDUs, allowing attackers to cause denial of service. This affects Sa...
Oct 20, 2025This vulnerability in Microsoft Exchange Server allows unauthorized attackers to perform spoofing attacks over the network due to improper input valid...
Oct 14, 2025A vulnerability in cel-rust allows attackers to cause denial of service by sending specially crafted CEL expressions. This affects systems using cel-r...
Oct 10, 2025This vulnerability in Authlib allows remote attackers to craft malicious JWT tokens with extremely large header or signature segments, causing excessi...
Oct 10, 2025CVE-2025-61582 is a denial-of-service vulnerability in TS3 Manager web interface versions 2.2.1 and earlier. Unauthenticated attackers can crash the a...
Oct 1, 2025CVE-2025-56404 is an information disclosure vulnerability in MariaDB MCP 0.1.0 where the SSE (Server-Sent Events) service lacks user validation, allow...
Sep 10, 2025E3 Site Supervisor Control firmware versions below 2.31F01 contain an API endpoint with insufficient input validation, allowing attackers to send craf...
Sep 2, 2025CVE-2025-57810 is a denial-of-service vulnerability in jsPDF library where user-controlled input to the addImage method can cause high CPU utilization...
Aug 26, 2025An improper input validation vulnerability in Schneider Electric devices allows attackers to cause denial of service by sending specially crafted FTP ...
Aug 18, 2025A buffer overflow vulnerability in the SetupUtility module allows attackers with local privileged access to execute arbitrary code. This affects syste...
Aug 13, 2025About Improper Input Validation (CWE-20)
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Our database tracks 1,542 CVEs classified as CWE-20, with 273 rated critical and 943 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.
External reference: View CWE-20 on MITRE CWE →
Monitor Improper Input Validation Vulnerabilities
Get alerted when new Improper Input Validation CVEs affect your infrastructure.
Start Monitoring Free