CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,553
Total CVEs
278
Critical
949
High
7.7
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
145
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 104
2 Google 80
3 Intel 60
4 Cisco 45
5 Qualcomm 44
6 Apache 44
7 Adobe 42
8 Huawei 40
9 Color 40
10 Reolink 36

All Improper Input Validation CVEs (1,553)

CVE-2025-26781
7.5

A vulnerability in Samsung Exynos processors' L2 layer incorrectly handles RLC AM PDUs, allowing attackers to cause denial of service. This affects Sa...

Oct 20, 2025
CVE-2025-59248
7.5

This vulnerability in Microsoft Exchange Server allows unauthorized attackers to perform spoofing attacks over the network due to improper input valid...

Oct 14, 2025
CVE-2025-62162
7.5

A vulnerability in cel-rust allows attackers to cause denial of service by sending specially crafted CEL expressions. This affects systems using cel-r...

Oct 10, 2025
CVE-2025-61920
7.5

This vulnerability in Authlib allows remote attackers to craft malicious JWT tokens with extremely large header or signature segments, causing excessi...

Oct 10, 2025
CVE-2025-61582
7.5

CVE-2025-61582 is a denial-of-service vulnerability in TS3 Manager web interface versions 2.2.1 and earlier. Unauthenticated attackers can crash the a...

Oct 1, 2025
CVE-2025-56404
7.5

CVE-2025-56404 is an information disclosure vulnerability in MariaDB MCP 0.1.0 where the SSE (Server-Sent Events) service lacks user validation, allow...

Sep 10, 2025
CVE-2025-52547
7.5

E3 Site Supervisor Control firmware versions below 2.31F01 contain an API endpoint with insufficient input validation, allowing attackers to send craf...

Sep 2, 2025
CVE-2025-57810
7.5

CVE-2025-57810 is a denial-of-service vulnerability in jsPDF library where user-controlled input to the addImage method can cause high CPU utilization...

Aug 26, 2025
CVE-2025-6625
7.5

An improper input validation vulnerability in Schneider Electric devices allows attackers to cause denial of service by sending specially crafted FTP ...

Aug 18, 2025
CVE-2025-4410
7.5

A buffer overflow vulnerability in the SetupUtility module allows attackers with local privileged access to execute arbitrary code. This affects syste...

Aug 13, 2025
CVE-2025-4276
7.5

This vulnerability in UsbCoreDxe allows attackers to write arbitrary memory inside SMRAM and execute arbitrary code at SMM level, potentially bypassin...

Aug 13, 2025
CVE-2025-49554
7.5

Adobe Commerce has an improper input validation vulnerability (CWE-20) that allows unauthenticated attackers to cause denial-of-service by sending spe...

Aug 12, 2025
CVE-2025-21086
7.5

This vulnerability in Intel 700 Series Ethernet drivers allows authenticated users to escalate privileges through improper input validation. It affect...

Aug 12, 2025
CVE-2025-21477
7.5

This vulnerability allows attackers to cause a Denial of Service (DoS) condition in affected Qualcomm systems by sending specially crafted CCCH data w...

Aug 6, 2025
CVE-2025-27211
7.5

CVE-2025-27211 is an improper input validation vulnerability in EdgeMAX EdgeSwitch that allows command injection via adjacent network access. Attacker...

Aug 4, 2025
CVE-2025-50492
7.5

This vulnerability allows attackers to hijack user sessions in PHPGurukul e-Diary Management System by exploiting improper session invalidation during...

Jul 28, 2025
CVE-2025-50489
7.5

This vulnerability allows attackers to hijack user sessions in PHPGurukul Student Result Management System v2.0 by exploiting improper session invalid...

Jul 28, 2025
CVE-2025-50490
7.5

This vulnerability allows attackers to hijack user sessions in PHPGurukul Student Result Management System by exploiting improper session invalidation...

Jul 28, 2025
CVE-2025-50494
7.5

This vulnerability allows attackers to hijack user sessions in PHPGurukul Car Washing Management System v1.0 by exploiting improper session invalidati...

Jul 28, 2025
CVE-2025-54365
7.5

CVE-2025-54365 is a regular expression denial-of-service (ReDoS) vulnerability in fastapi-guard version 3.0.1 where the patch limiting string length f...

Jul 23, 2025
CVE-2024-42516
7.5

This HTTP response splitting vulnerability in Apache HTTP Server allows attackers to manipulate Content-Type headers to split HTTP responses, potentia...

Jul 10, 2025
CVE-2025-26780
7.5

A missing length check in Samsung Exynos 2400 and Modem 5400 chips allows attackers to cause denial of service via malformed PDCP packets. This affect...

Jul 7, 2025
CVE-2025-6709
7.5

MongoDB Server is vulnerable to denial of service when processing specific date values in JSON input during OIDC authentication. An attacker can crash...

Jun 26, 2025
CVE-2025-52894
7.5

OpenBao before version 2.3.0 allows unauthenticated attackers to cancel root rekey and recovery rekey operations, causing denial of service. This affe...

Jun 25, 2025
CVE-2024-55567
7.5

This vulnerability allows attackers to write arbitrary memory inside SMRAM and execute arbitrary code at SMM level due to improper input validation in...

Jun 12, 2025
CVE-2021-25255
7.5

This vulnerability in Yandex Browser Lite for Android allows remote attackers to cause a denial of service (crash) by sending specially crafted conten...

May 21, 2025
CVE-2025-24308
7.5

This vulnerability allows a privileged user with local access to Intel Server D50DNP and M50FCP systems to potentially escalate privileges through imp...

May 13, 2025
CVE-2025-21094
7.5

This vulnerability allows a privileged user with local access to Intel Server D50DNP and M50FCP boards to potentially escalate privileges through impr...

May 13, 2025
CVE-2025-31240
7.5

A vulnerability in macOS AFP network share mounting allows attackers to cause system termination (kernel panic) by tricking users into connecting to m...

May 12, 2025
CVE-2025-26413
7.5

An improper input validation vulnerability in Apache Kvrocks allows attackers to crash the server by sending a negative offset value to the SETRANGE c...

Apr 22, 2025
CVE-2025-29784
7.5

NamelessMC versions 2.1.4 and earlier have a vulnerability in forum search functionality where the 's' parameter in GET requests lacks length validati...

Apr 18, 2025
CVE-2024-37917
7.5

CVE-2024-37917 is an improper input validation vulnerability in Pexip Infinity video conferencing software that allows remote attackers to cause a den...

Apr 2, 2025
CVE-2025-30471
7.5

A validation logic vulnerability in multiple Apple operating systems allows remote attackers to cause denial-of-service conditions. This affects users...

Mar 31, 2025
CVE-2023-0881
7.5

This vulnerability allows attackers to cause a kernel crash (denial of service) by launching DDoS attacks against TCP port 22 (SSH) on affected system...

Mar 31, 2025
CVE-2024-13681
7.5

The Uncode WordPress theme contains an arbitrary file read vulnerability that allows unauthenticated attackers to read any file on the server. This af...

Feb 18, 2025
CVE-2024-28127
7.5

This UEFI firmware vulnerability in certain Intel processors allows privileged local attackers to bypass security controls and gain higher system priv...

Feb 12, 2025
CVE-2024-29214
7.5

This vulnerability allows a privileged user (like an administrator) to potentially escalate privileges through improper input validation in UEFI firmw...

Feb 12, 2025
CVE-2024-24582
7.5

This vulnerability allows a privileged user to escalate privileges via local access due to improper input validation in the XmlCli feature of UEFI fir...

Feb 12, 2025
CVE-2023-34440
7.5

This UEFI firmware vulnerability in certain Intel processors allows a privileged attacker with local access to potentially escalate privileges by expl...

Feb 12, 2025
CVE-2023-49615
7.5

This vulnerability allows a privileged user with local access to potentially escalate privileges through improper input validation in Intel System Sec...

Feb 12, 2025
CVE-2024-0112
7.5

This vulnerability in NVIDIA Jetson AGX Orin and IGX Orin software allows attackers to escalate permissions through improper input validation. Success...

Feb 12, 2025
CVE-2025-21230
7.5

Microsoft Message Queuing (MSMQ) contains a vulnerability that allows attackers to cause a denial of service condition by sending specially crafted pa...

Jan 14, 2025
CVE-2021-22484
7.5

This vulnerability in Huawei wearables allows attackers to cause server out-of-memory conditions by sending specially crafted data that exceeds expect...

Dec 28, 2024
CVE-2022-34159
7.5

Huawei printers have an input validation vulnerability that allows attackers to send specially crafted input to cause service exceptions. This affects...

Dec 20, 2024
CVE-2024-47238
7.5

This vulnerability allows a high-privileged attacker with local access to execute arbitrary code on Dell systems due to improper input validation in a...

Dec 12, 2024
CVE-2024-52802
7.5

This vulnerability in RIOT OS allows attackers to trigger out-of-bounds memory reads by sending malformed DHCPv6 packets to IoT devices. The lack of h...

Nov 22, 2024
CVE-2022-2232
7.5

CVE-2022-2232 is an LDAP injection vulnerability in Keycloak that allows attackers to manipulate LDAP queries during username lookups. This can enable...

Nov 14, 2024
CVE-2024-50305
7.5

A vulnerability in Apache Traffic Server allows a specially crafted Host header to cause a denial-of-service crash. This affects Apache Traffic Server...

Nov 14, 2024
CVE-2024-38479
7.5

Apache Traffic Server has an improper input validation vulnerability (CWE-20) that could allow attackers to cause denial of service or potentially exe...

Nov 14, 2024
CVE-2024-41167
7.5

This CVE describes an improper input validation vulnerability in UEFI firmware on specific Intel server boards. A privileged user with local access co...

Nov 13, 2024

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,553 CVEs classified as CWE-20, with 278 rated critical and 949 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free