CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,465
Total CVEs
249
Critical
890
High
7.7
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
145
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 100
2 Google 72
3 Intel 55
4 Qualcomm 43
5 Apache 43
6 Adobe 41
7 Color 40
8 Huawei 39
9 Reolink 36
10 Apple 33

All Improper Input Validation CVEs (1,465)

CVE-2025-53075
9.8

CVE-2025-53075 is a path traversal vulnerability in Samsung's rLottie animation library that allows attackers to read arbitrary files on the system. T...

Jun 30, 2025
CVE-2025-31477
9.8

CVE-2025-31477 is a critical vulnerability in Tauri's shell plugin that allows remote code execution. The open endpoint fails to properly validate all...

Apr 2, 2025
CVE-2025-30452
9.8

This CVE describes a critical input validation vulnerability in macOS that could allow attackers to execute arbitrary code or cause system crashes. It...

Mar 31, 2025
CVE-2024-36047
9.8

Infoblox NIOS has an improper input validation vulnerability that could allow attackers to execute arbitrary code or cause denial of service. This aff...

Feb 27, 2025
CVE-2024-47857
9.8

This vulnerability allows an existing PrivX user (account A) to impersonate another existing PrivX user (account B) by exploiting insufficient signatu...

Jan 31, 2025
CVE-2025-22137
9.8

CVE-2025-22137 is a critical file overwrite vulnerability in Pingvin Share that allows attackers to overwrite arbitrary files on the server via HTTP P...

Jan 8, 2025
CVE-2024-11737
9.8

An unauthenticated attacker can send specially crafted Modbus packets to Schneider Electric controllers, causing denial of service and potentially com...

Dec 11, 2024
CVE-2024-49368
9.8

CVE-2024-49368 is a critical command injection vulnerability in Nginx UI that allows attackers to execute arbitrary commands on the server. This affec...

Oct 21, 2024
CVE-2024-47823
9.8

This vulnerability in Livewire allows attackers to bypass file upload validation by uploading PHP files disguised as images. If the server stores uplo...

Oct 8, 2024
CVE-2024-33066
9.8

This vulnerability allows memory corruption when log files are redirected to arbitrary file locations with arbitrary names. It affects systems using Q...

Oct 7, 2024
CVE-2024-46946
9.8

CVE-2024-46946 is a critical remote code execution vulnerability in LangChain Experimental's LLMSymbolicMathChain component. Attackers can execute arb...

Sep 19, 2024
CVE-2024-44808
9.8

This vulnerability allows remote attackers to execute arbitrary code on Vypor Attack API System v1.0 servers by manipulating the user GET parameter. A...

Sep 4, 2024
CVE-2024-44809
9.8

This vulnerability allows remote attackers to execute arbitrary commands on servers running Pi Camera version 1.0 by sending malicious input to the 'p...

Sep 3, 2024
CVE-2024-8073
9.8

This CVE describes a command injection vulnerability in Hillstone Networks Web Application Firewall that allows attackers to execute arbitrary command...

Aug 26, 2024
CVE-2024-45258
9.8

The req package for Go before version 3.43.4 may send unintended HTTP requests when provided with malformed URLs due to a 'garbage in, garbage out' de...

Aug 25, 2024
CVE-2024-42531
9.8

This vulnerability allows unauthenticated attackers to potentially access live video streams from Ezviz Internet PT Camera CS-CV246 D15655150 by craft...

Aug 23, 2024
CVE-2024-42458
9.8

Neat VNC before version 0.8.1 fails to properly validate the security type during connection establishment, allowing attackers to bypass authenticatio...

Aug 2, 2024
CVE-2024-41116
9.8

This vulnerability allows remote code execution in streamlit-geospatial applications by exploiting unsafe eval() usage with user-controlled input. Att...

Jul 26, 2024
CVE-2024-41119
9.8

CVE-2024-41119 is a critical remote code execution vulnerability in streamlit-geospatial where user-controlled input is passed to the eval() function ...

Jul 26, 2024
CVE-2024-41114
9.8

This vulnerability in streamlit-geospatial allows remote code execution via unsafe eval() usage with user-controlled input. Attackers can execute arbi...

Jul 26, 2024
CVE-2024-41113
9.8

This vulnerability in streamlit-geospatial allows remote code execution through unsafe use of the eval() function with user-controlled input. Attacker...

Jul 26, 2024
CVE-2024-5276
9.8

A SQL injection vulnerability in Fortra FileCatalyst Workflow allows attackers to modify application data, potentially creating administrative users o...

Jun 25, 2024
CVE-2024-5988
9.8

CVE-2024-5988 is a critical remote code execution vulnerability in Rockwell Automation ThinManager ThinServer. Unauthenticated attackers can send mali...

Jun 25, 2024
CVE-2024-5171
9.8

CVE-2024-5171 is an integer overflow vulnerability in libaom's image allocation functions that can lead to heap buffer overflow when processing large ...

Jun 5, 2024
CVE-2024-33999
9.8

This vulnerability in Moodle's MFA system allows attackers to bypass multi-factor authentication by manipulating the referrer URL. It affects Moodle i...

May 31, 2024
CVE-2024-4609
9.8

This SQL injection vulnerability in Rockwell Automation FactoryTalk View SE Datalog function allows attackers to execute malicious SQL statements if d...

May 16, 2024
CVE-2024-4547
9.8

An unauthenticated SQL injection vulnerability in Delta Electronics DIAEnergie allows remote attackers to execute arbitrary SQL commands via specially...

May 6, 2024
CVE-2024-21473
9.8

This vulnerability allows memory corruption when redirecting log files to arbitrary locations with arbitrary filenames in Qualcomm components. It affe...

Apr 1, 2024
CVE-2024-25995
9.8

CVE-2024-25995 allows unauthenticated remote attackers to execute arbitrary code with root privileges or cause denial of service by exploiting imprope...

Mar 12, 2024
CVE-2024-20017
9.8

CVE-2024-20017 is a critical vulnerability in MediaTek Wi-Fi chipsets that allows remote code execution without authentication or user interaction. An...

Mar 4, 2024
CVE-2023-32484
9.8

Dell Networking Switches running vulnerable Enterprise SONiC versions contain an improper input validation vulnerability that allows remote unauthenti...

Feb 15, 2024
CVE-2024-21413
9.8

CVE-2024-21413 is a critical remote code execution vulnerability in Microsoft Outlook that allows attackers to execute arbitrary code by tricking user...

Feb 13, 2024
CVE-2023-48425
9.8

CVE-2023-48425 is a critical vulnerability in U-Boot bootloader that allows persistent code execution by bypassing secure boot protections. This affec...

Dec 11, 2023
CVE-2023-32485
9.8

Dell SmartFabric Storage Software versions 1.3 and lower contain an improper input validation vulnerability that allows remote unauthenticated attacke...

Oct 5, 2023
CVE-2023-36619
9.8

CVE-2023-36619 allows unauthenticated remote attackers to execute administrative scripts on Atos Unify OpenScape Session Border Controller systems. Th...

Oct 4, 2023
CVE-2023-22515
9.8

CVE-2023-22515 is a critical vulnerability in Atlassian Confluence Data Center and Server that allows unauthenticated attackers to create administrato...

Oct 4, 2023
CVE-2023-40743
9.8

This vulnerability in Apache Axis 1.x allows attackers to pass untrusted input to ServiceFactory.getService, which can trigger dangerous lookup mechan...

Sep 5, 2023
CVE-2023-41746
9.8

CVE-2023-41746 is a critical remote command execution vulnerability in Acronis Cloud Manager for Windows due to improper input validation. Attackers c...

Aug 31, 2023
CVE-2023-41748
9.8

This vulnerability allows remote attackers to execute arbitrary commands on affected Acronis Cloud Manager installations due to improper input validat...

Aug 31, 2023
CVE-2023-2917
9.8

CVE-2023-2917 is a critical path traversal vulnerability in Rockwell Automation ThinManager Thinserver that allows unauthenticated remote attackers to...

Aug 17, 2023
CVE-2023-39405
9.8

This vulnerability allows out-of-bounds read/write operations in the Wi-Fi module, potentially enabling privilege escalation attacks. Successful explo...

Aug 13, 2023
CVE-2023-39532
9.8

CVE-2023-39532 is a critical vulnerability in SES (Secure ECMAScript) that allows guest programs running in Compartments to bypass confinement and acc...

Aug 8, 2023
CVE-2023-35365
9.8

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Routing and Remote Access Service (RRAS) without authe...

Jul 11, 2023
CVE-2023-35367
9.8

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running the Routing and Remote Access Service (RRAS) without a...

Jul 11, 2023
CVE-2023-32057
9.8

This vulnerability allows remote attackers to execute arbitrary code on systems running Microsoft Message Queuing (MSMQ) by sending specially crafted ...

Jul 11, 2023
CVE-2023-35797
9.8

This vulnerability allows attackers to bypass security checks and achieve remote code execution (RCE) in Apache Airflow Hive Provider by exploiting im...

Jul 3, 2023
CVE-2023-28324
9.8

CVE-2023-28324 is an improper input validation vulnerability in Ivanti Endpoint Manager that could allow attackers to escalate privileges or execute a...

Jul 1, 2023
CVE-2023-34152
9.8

CVE-2023-34152 is a critical remote code execution vulnerability in ImageMagick's OpenBlob function when compiled with --enable-pipes configuration. A...

May 30, 2023
CVE-2023-32321
9.8

CVE-2023-32321 is a critical vulnerability in CKAN data management systems that allows authenticated users to write arbitrary files and achieve remote...

May 26, 2023
CVE-2022-47937
9.8

This vulnerability in Apache Sling Commons JSON allows attackers to cause denial of service or potentially execute arbitrary code by sending specially...

May 15, 2023

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,465 CVEs classified as CWE-20, with 249 rated critical and 890 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free