CWE-20: Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Yearly Trend
Top Affected Vendors
All Improper Input Validation CVEs (1,652)
CVE-2025-2376 is a critical deserialization vulnerability in viames Pair Framework's PHP Object Handler component. Attackers can remotely exploit the ...
Mar 17, 2025This critical vulnerability in Aridius XYZ for OpenCart allows remote attackers to execute arbitrary code through deserialization attacks in the News ...
Jan 29, 2025A critical deserialization vulnerability in AquilaCMS allows remote attackers to execute arbitrary code by manipulating the PostBody.populate paramete...
Jan 14, 2025This CVE describes a remote code execution vulnerability in Rockwell Automation products where users can save projects to a public directory, allowing...
Nov 12, 2024This PowerShell Elevation of Privilege Vulnerability allows authenticated attackers to execute arbitrary code with SYSTEM privileges on affected Windo...
Jul 9, 2024CVE-2024-38355 is a denial-of-service vulnerability in Socket.IO where specially crafted packets can trigger uncaught exceptions, causing the Node.js ...
Jun 19, 2024This vulnerability in GLPI Agent on Windows allows local users to cause denial of service by modifying the GLPI server URL or disabling the service. I...
Apr 25, 2024This vulnerability allows local third-party apps on affected Nokia Android devices to execute arbitrary AT commands with radio user privileges via AT ...
Apr 22, 2024This vulnerability allows attackers to cause a denial-of-service (DoS) condition by sending specially crafted ASN.1 OER messages containing unknown ex...
Apr 1, 2024A local attacker can execute arbitrary code by providing a crafted configuration file to the sanei_configure_attach() function in Sane 1.2.1. This vul...
Mar 27, 2024CVE-2024-27613 is an input validation vulnerability in Numbas editor versions before 7.3 that allows improper handling of themes and extensions. This ...
Mar 8, 2024This vulnerability in follow-redirects package allows attackers to manipulate URL parsing errors to redirect traffic to malicious sites. It affects ap...
Jan 2, 2024This vulnerability in Intel QuickAssist Technology (QAT) firmware allows attackers with adjacent network access to potentially escalate privileges or ...
Nov 14, 2023This vulnerability in NVIDIA DGX H100 BMC's IPMI interface allows attackers to execute arbitrary code, cause denial of service, escalate privileges, o...
Sep 20, 2023CVE-2023-36762 is a remote code execution vulnerability in Microsoft Word that allows attackers to execute arbitrary code on a victim's system by tric...
Sep 12, 2023CVE-2023-34239 is a vulnerability in the Gradio Python library that allows attackers to access arbitrary files on the server and proxy requests to una...
Jun 8, 2023CVE-2023-32695 is a denial-of-service vulnerability in socket.io-parser where a specially crafted Socket.IO packet triggers an uncaught exception, cra...
May 27, 2023This CVE describes a command injection vulnerability in Snowflake JDBC drivers that allows remote code execution. An attacker can trick users into con...
Apr 14, 2023This path traversal vulnerability in Siemens TIA Portal allows attackers to create or overwrite arbitrary files when users open malicious PC system co...
Apr 11, 2023This vulnerability allows authenticated Splunk users to bypass SPL safeguards for risky commands by crafting a saved search job that uses the 'pivot' ...
Feb 14, 2023This Android vulnerability allows a malicious app with user execution privileges to disable notifications for any user on the device through improper ...
Dec 15, 2021CVE-2021-29242 is an improper input validation vulnerability in CODESYS Control Runtime systems that allows attackers to send crafted packets to manip...
May 3, 2021This vulnerability allows authenticated low-privileged users on Cisco IOS XE SD-WAN devices to execute arbitrary commands as root through command inje...
Mar 24, 2021This vulnerability allows attackers to inject malicious JavaScript code into the Secomea GateManager web interface through improper input validation. ...
Mar 5, 2021CVE-2020-27337 is an improper input validation vulnerability in Treck's IPv6 stack that allows unauthenticated remote attackers to trigger an out-of-b...
Dec 22, 2020A local privilege escalation vulnerability in Cisco AnyConnect Secure Mobility Client allows authenticated local attackers to execute arbitrary script...
Nov 6, 2020A command injection vulnerability in n8n's community package installation functionality allows authenticated administrators to execute arbitrary syste...
Feb 4, 2026An authenticated attacker with valid credentials can exploit improper input handling in the web management interface of Aruba mobility conductors runn...
Jan 13, 2026This vulnerability allows remote attackers to execute arbitrary commands on affected camera systems due to improper input validation in video analytic...
Dec 26, 2025This Cross-site scripting (XSS) vulnerability in Open Source Point of Sale v3.4.1 allows remote attackers to inject malicious scripts via the phone_nu...
Dec 17, 2025This Cross-site scripting (XSS) vulnerability in Open Source Point of Sale v3.4.1 allows remote attackers to inject malicious scripts via the 'name' p...
Dec 17, 2025A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with Actioner privileges to execute arbitrary com...
Dec 11, 2025A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with Actioner privileges to execute arbitrary com...
Dec 11, 2025A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with Actioner privileges to execute arbitrary com...
Dec 11, 2025A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with Actioner privileges to execute arbitrary com...
Dec 11, 2025This vulnerability allows authenticated administrators on NETGEAR Nighthawk R7000P routers to execute arbitrary operating system commands through comm...
Dec 9, 2025This vulnerability allows authenticated users with IDE role permissions in SecOps SOAR servers to achieve remote code execution by uploading malicious...
Dec 9, 2025This CVE describes a remote code execution vulnerability in Thermo Fisher Torrent Suite's Django application where attackers can execute arbitrary com...
Dec 4, 2025MotionEye v0.43.1b4 and earlier contains an OS command injection vulnerability where authenticated admin users can inject malicious commands through c...
Oct 3, 2025This CVE describes a CSS injection vulnerability in Misskey's URL preview functionality. Attackers can inject arbitrary CSS to create fake error messa...
May 5, 2025This vulnerability in Siemens SCALANCE industrial wireless devices allows authenticated remote attackers to execute arbitrary shell commands by exploi...
Feb 11, 2025This vulnerability allows unauthenticated remote attackers to execute arbitrary code on affected Siemens industrial routers by exploiting improper inp...
Nov 12, 2024SuiteCRM versions before 7.14.6 and 8.7.1 contain a vulnerability in their malicious MLP (Module Loadable Package) prevention mechanism. Attackers can...
Nov 5, 2024This UEFI firmware vulnerability in certain Intel processors allows privileged users to potentially disclose sensitive information or cause denial of ...
Sep 16, 2024This vulnerability affects multiple Siemens industrial routers and allows authenticated remote attackers to execute arbitrary code by exploiting impro...
Aug 13, 2024CVE-2021-22508 is an SQL injection vulnerability in OpenText Operations Bridge Reporter that allows authenticated administrators to execute arbitrary ...
May 17, 2024This vulnerability allows a privileged user with local access to Intel Server D50DNP Family systems to escalate privileges through improper input vali...
May 16, 2024This vulnerability in Intel BIOS Guard firmware allows a privileged user with local access to potentially escalate privileges through improper input v...
May 16, 2024This vulnerability in mintplex-labs/anything-llm allows attackers to read and delete arbitrary files on the server by manipulating the 'logo_filename'...
Apr 16, 2024This vulnerability in mintplex-labs/anything-llm allows attackers to disable Multi-User Mode via improper input validation, enabling them to create ne...
Apr 10, 2024About Improper Input Validation (CWE-20)
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Our database tracks 1,652 CVEs classified as CWE-20, with 320 rated critical and 1,006 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.8.
External reference: View CWE-20 on MITRE CWE →
Monitor Improper Input Validation Vulnerabilities
Get alerted when new Improper Input Validation CVEs affect your infrastructure.
Start Monitoring Free