CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,648
Total CVEs
319
Critical
1,003
High
7.8
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
145
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 104
2 Google 84
3 Cisco 67
4 Intel 61
5 Qualcomm 48
6 Apache 47
7 Adobe 42
8 Huawei 42
9 Apple 40
10 Color 40

All Improper Input Validation CVEs (1,648)

CVE-2020-3133
7.5

This vulnerability allows unauthenticated remote attackers to bypass email content filters on Cisco Email Security Appliances by sending specially cra...

Sep 23, 2020
CVE-2020-24940
7.5

This vulnerability in Laravel allows attackers to bypass mass assignment protection by manipulating table names in database queries, potentially savin...

Sep 4, 2020
CVE-2020-5778
7.5

An unauthenticated remote attacker can send a specially crafted type 8 message to Trading Technologies Messaging service on TCP port 10200, causing th...

Sep 2, 2020
CVE-2020-25059
7.5

This vulnerability in LG mobile devices allows attackers to cause a service crash through incorrect input validation. It affects LG devices running An...

Aug 31, 2020
CVE-2020-25063
7.5

This vulnerability in LG mobile devices with specific Android versions allows application crashes due to incorrect input validation at the application...

Aug 31, 2020
CVE-2020-4559
7.5

IBM Spectrum Protect 7.1 and 8.1 contains an input validation vulnerability that allows attackers to cause denial of service by sending specially craf...

Aug 28, 2020
CVE-2020-24359
7.5

HashiCorp vault-ssh-helper versions up to 0.1.6 incorrectly accept Vault-issued SSH OTPs for an entire subnet rather than a specific IP address, allow...

Aug 20, 2020
CVE-2020-15694
7.5

This vulnerability in Nim's standard library httpClient allows malicious servers to provide negative Content-Length values, which the client fails to ...

Aug 14, 2020
CVE-2020-7518
7.5

This vulnerability allows attackers to modify project configuration files in Schneider Electric's Easergy Builder software due to improper input valid...

Jul 23, 2020
CVE-2020-10922
7.5

This vulnerability allows unauthenticated remote attackers to cause denial-of-service on C-MORE HMI EA9 touch screen panels by sending specially craft...

Jul 23, 2020
CVE-2019-19416
7.5

This vulnerability in Huawei SIP modules allows remote attackers to cause denial of service by sending specially crafted SIP messages. Successful expl...

Jul 8, 2020
CVE-2020-15503
7.5

CVE-2020-15503 is an integer overflow vulnerability in LibRaw's thumbnail processing code that allows attackers to cause heap-based buffer overflows b...

Jul 2, 2020
CVE-2019-11253
7.5

This CVE-2019-11253 vulnerability in Kubernetes allows authorized users to send malicious YAML or JSON payloads to the API server, causing excessive C...

Oct 17, 2019
CVE-2025-68134
7.4

This vulnerability in EVerest EV charging software allows attackers to cause denial of service by triggering assertion failures that crash individual ...

Jan 21, 2026
CVE-2025-30648
7.4

An unauthenticated adjacent attacker can send a malformed DHCP packet to crash the Juniper DHCP daemon (jdhcpd) when dhcp-security is enabled, causing...

Apr 9, 2025
CVE-2024-20327
7.4

An unauthenticated adjacent attacker can crash the ppp_ma process on Cisco ASR 9000 routers running IOS XR with BNG and PPPoE termination, causing den...

Mar 13, 2024
CVE-2024-20318
7.4

This vulnerability in Cisco IOS XR Software allows an unauthenticated attacker on the same network segment to send specially crafted Ethernet frames t...

Mar 13, 2024
CVE-2024-22770
7.4

This vulnerability in Hitron Systems DVR HVR-16781 allows attackers to perform network attacks when default admin credentials are used. The improper i...

Jan 23, 2024
CVE-2024-22772
7.4

This vulnerability in Hitron Systems DVR devices allows attackers to perform network attacks when default admin credentials are used. It affects Hitro...

Jan 23, 2024
CVE-2024-22768
7.4

This vulnerability in Hitron Systems DVR HVR-4781 allows attackers to perform network attacks when the device uses default admin credentials. The impr...

Jan 23, 2024
CVE-2023-22382
7.4

This vulnerability involves weak configuration in Automotive systems when a Virtual Machine (VM) processes listener requests from the Trusted Executio...

Oct 3, 2023
CVE-2023-36873
7.4

CVE-2023-36873 is a spoofing vulnerability in the .NET Framework that allows attackers to manipulate data or impersonate legitimate sources. This affe...

Aug 8, 2023
CVE-2023-1250
7.4

This vulnerability allows local attackers to execute arbitrary code on OTRS systems by injecting malicious code into ACL module comments or names duri...

Mar 20, 2023
CVE-2022-33964
7.4

This vulnerability in Intel SUR software allows unauthenticated attackers to potentially escalate privileges via network access due to improper input ...

Feb 16, 2023
CVE-2022-22163
7.4

An improper input validation vulnerability in Juniper's DHCP daemon (jdhcpd) allows adjacent unauthenticated attackers to crash the service by sending...

Jan 19, 2022
CVE-2021-3907
7.4

OctoRPKI has a path traversal vulnerability where malicious repositories can write files outside the designated cache directory using '..' sequences i...

Nov 11, 2021
CVE-2021-34714
7.4

This vulnerability allows an unauthenticated attacker on the same network segment to send specially crafted UDLD packets to Cisco networking devices, ...

Sep 23, 2021
CVE-2021-0267
7.4

This vulnerability allows an attacker to cause a denial of service (DoS) by sending a specially crafted DHCP packet to Juniper Junos OS devices runnin...

Apr 22, 2021
CVE-2021-20247
7.4

This vulnerability in mbsync allows a malicious or compromised IMAP server to use specially crafted mailbox names containing '..' path components to a...

Feb 23, 2021
CVE-2020-3577
7.4

A vulnerability in Cisco Firepower Threat Defense (FTD) Software allows an unauthenticated adjacent attacker to cause denial of service by sending mal...

Oct 21, 2020
CVE-2020-3488
7.4

This vulnerability allows an unauthenticated attacker on the same network segment to send specially crafted CAPWAP packets to Cisco Catalyst 9800 Seri...

Sep 24, 2020
CVE-2020-3494
7.4

This vulnerability allows an unauthenticated attacker on the same network segment to send specially crafted CAPWAP packets to Cisco Catalyst 9800 Seri...

Sep 24, 2020
CVE-2020-3465
7.4

This vulnerability in Cisco IOS XE Software allows an unauthenticated attacker on the same network segment to cause a denial of service by sending spe...

Sep 24, 2020
CVE-2020-3409
7.4

This vulnerability allows an unauthenticated attacker on the same network segment to send specially crafted PROFINET packets to Cisco IOS/IOS XE devic...

Sep 24, 2020
CVE-2020-3390
7.4

This vulnerability allows an unauthenticated attacker on the same network to send a crafted 802.1x packet during wireless client authentication, causi...

Sep 24, 2020
CVE-2026-2113
7.3

This CVE describes a remote code execution vulnerability in yuan1994 tpadmin's WebUploader component through insecure deserialization in preview.php. ...

Feb 7, 2026
CVE-2026-23880
7.3

OnboardLite versions before commit 1d32081a66f21bcf41df1ecb672490b13f6e429f contain a stored cross-site scripting (XSS) vulnerability that allows atta...

Jan 19, 2026
CVE-2025-48594
7.3

This vulnerability allows a malicious companion application to retain elevated privileges after being disassociated from a device, enabling local priv...

Dec 8, 2025
CVE-2025-11135
7.3

This vulnerability in pmTicket Project-Management-Software allows remote attackers to execute arbitrary code through deserialization of manipulated us...

Sep 29, 2025
CVE-2025-10164
7.3

CVE-2025-10164 is a remote code execution vulnerability in lmsys sglang 0.4.6 caused by unsafe deserialization in the update_weights_from_tensor funct...

Sep 9, 2025
CVE-2025-48556
7.3

This vulnerability in Android's NotificationChannel component allows local privilege escalation through improper input validation. Attackers can explo...

Sep 4, 2025
CVE-2025-7216
7.3

This critical vulnerability in Aidigu software allows remote attackers to execute arbitrary code through PHP object deserialization in the checkUserCo...

Jul 9, 2025
CVE-2025-5878
7.3

This vulnerability in ESAPI esapi-java-legacy allows SQL injection attacks through the Encoder.encodeForSQL interface due to improper neutralization o...

Jun 29, 2025
CVE-2025-5499
7.3

This critical vulnerability in slackero phpwcms allows remote attackers to execute arbitrary code through deserialization attacks via manipulated imag...

Jun 3, 2025
CVE-2025-22235
7.3

This Spring Security vulnerability allows unauthorized access to /null endpoints when EndpointRequest.to() references disabled or unexposed actuator e...

Apr 28, 2025
CVE-2025-1736
7.3

This CVE describes an insufficient validation vulnerability in PHP's header handling that could allow attackers to manipulate HTTP headers. When user-...

Mar 30, 2025
CVE-2025-1514
7.3

This vulnerability in the Active Products Tables for WooCommerce WordPress plugin allows unauthenticated attackers to call arbitrary WordPress filters...

Mar 26, 2025
CVE-2025-2376
7.3

CVE-2025-2376 is a critical deserialization vulnerability in viames Pair Framework's PHP Object Handler component. Attackers can remotely exploit the ...

Mar 17, 2025
CVE-2025-0841
7.3

This critical vulnerability in Aridius XYZ for OpenCart allows remote attackers to execute arbitrary code through deserialization attacks in the News ...

Jan 29, 2025
CVE-2025-0465
7.3

A critical deserialization vulnerability in AquilaCMS allows remote attackers to execute arbitrary code by manipulating the PostBody.populate paramete...

Jan 14, 2025

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,648 CVEs classified as CWE-20, with 319 rated critical and 1,003 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.8.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free