CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,663
Total CVEs
321
Critical
1,017
High
7.8
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
149
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 104
2 Google 88
3 Cisco 72
4 Intel 62
5 Qualcomm 49
6 Apache 47
7 Adobe 42
8 Huawei 42
9 Apple 40
10 Color 40

All Improper Input Validation CVEs (1,663)

CVE-2025-20031
6.5

This vulnerability in Intel Graphics Drivers allows authenticated local users to cause denial of service through improper input validation. It affects...

May 13, 2025
CVE-2025-40556
6.5

A vulnerability in Siemens BACnet ATEC 550 series devices allows attackers on the same BACnet network to send specially crafted MSTP messages that cau...

May 13, 2025
CVE-2025-24510
6.5

A vulnerability in Siemens MS/TP Point Pickup Module allows attackers on the same BACnet network to send specially crafted MSTP messages, causing a de...

May 13, 2025
CVE-2025-31215
6.5

This vulnerability allows malicious web content to cause unexpected process crashes in Apple's Safari browser and operating systems. It affects users ...

May 12, 2025
CVE-2025-32079
6.5

An improper input validation vulnerability in Wikimedia's GrowthExperiments MediaWiki extension allows attackers to cause HTTP denial-of-service (DoS)...

Apr 11, 2025
CVE-2023-43037
6.5

This vulnerability in IBM Maximo Application Suite allows authenticated users to perform unauthorized actions due to improper input validation. It aff...

Apr 10, 2025
CVE-2025-3070
6.5

This vulnerability in Google Chrome extensions allows attackers to escalate privileges by tricking users into visiting a malicious webpage. It affects...

Apr 2, 2025
CVE-2025-1767
6.5

This CVE affects Kubernetes clusters using the deprecated in-tree gitRepo volume feature to clone git repositories from other pods on the same node. T...

Mar 13, 2025
CVE-2025-0764
6.5

The wpForo Forum WordPress plugin has an arbitrary file read vulnerability that allows authenticated attackers with subscriber-level access or higher ...

Feb 28, 2025
CVE-2024-13691
6.5

The Uncode WordPress theme has a vulnerability that allows authenticated attackers with Subscriber-level access or higher to read arbitrary files on t...

Feb 18, 2025
CVE-2025-0815
6.5

An improper input validation vulnerability in Schneider Electric products allows attackers to cause denial-of-service by sending malicious ICMPv6 pack...

Feb 13, 2025
CVE-2024-42410
6.5

This vulnerability in Intel Graphics Drivers allows authenticated local users to cause denial of service through improper input validation. It affects...

Feb 12, 2025
CVE-2025-24319
6.5

This vulnerability allows attackers to send specific API requests to BIG-IP Next Central Manager that cause its Kubernetes service to crash, resulting...

Feb 5, 2025
CVE-2024-52590
6.5

This vulnerability in Misskey allows attackers to create fake user profiles that appear to belong to different federated instances, enabling impersona...

Dec 18, 2024
CVE-2024-55653
6.5

This vulnerability in PwnDoc allows authenticated users to crash the backend server by triggering an unhandled promise rejection during audit operatio...

Dec 10, 2024
CVE-2024-45422
6.5

An improper input validation vulnerability in Zoom Apps before version 6.2.0 allows unauthenticated attackers to cause denial of service via network a...

Nov 19, 2024
CVE-2024-32048
6.5

An improper input validation vulnerability in Intel OpenVINO Model Server allows unauthenticated attackers on adjacent networks to cause denial of ser...

Nov 13, 2024
CVE-2024-24984
6.5

This vulnerability in Intel Wireless Bluetooth drivers for Windows allows an unauthenticated attacker within Bluetooth range to potentially cause deni...

Nov 13, 2024
CVE-2024-8936
6.5

This CVE describes an Improper Input Validation vulnerability in Schneider Electric controllers that allows a Man-in-the-Middle attacker to send craft...

Nov 13, 2024
CVE-2024-43558
6.5

This vulnerability in the Windows Mobile Broadband Driver allows an attacker to cause a denial of service (system crash/BSOD) by sending specially cra...

Oct 8, 2024
CVE-2024-43540
6.5

This vulnerability in the Windows Mobile Broadband Driver allows attackers to cause a denial of service (system crash/BSOD) by sending specially craft...

Oct 8, 2024
CVE-2024-6436
6.5

An input validation vulnerability in Rockwell Automation Sequence Manager allows attackers to send malformed packets causing denial-of-service. The de...

Sep 27, 2024
CVE-2024-38234
6.5

CVE-2024-38234 is a Windows networking vulnerability that allows attackers to cause denial of service by sending specially crafted network packets to ...

Sep 10, 2024
CVE-2024-25009
6.5

Ericsson Packet Core Controller (PCC) has an input validation vulnerability in its Access and Mobility Management Function (AMF) that allows attackers...

Aug 20, 2024
CVE-2024-7507
6.5

CVE-2024-7507 is a denial-of-service vulnerability in Rockwell Automation controllers where receiving a malformed PCCC message causes the controller t...

Aug 14, 2024
CVE-2024-23669
6.5

CVE-2024-23669 is an improper authorization vulnerability in Fortinet FortiWebManager that allows attackers to execute unauthorized code or commands v...

Jun 5, 2024
CVE-2024-30054
6.5

This vulnerability in Microsoft Power BI Client JavaScript SDK allows attackers to disclose sensitive information from affected systems. It affects or...

May 14, 2024
CVE-2023-0775
6.5

This vulnerability in Silicon Labs Gecko SDK Bluetooth LE stack allows an attacker to send a malformed 'prepare write request' command that causes mem...

Mar 28, 2023
CVE-2023-25661
6.5

This vulnerability in TensorFlow allows an attacker with input privileges to provide malicious data to the Convolution3DTranspose function, causing a ...

Mar 27, 2023
CVE-2023-28330
6.5

CVE-2023-28330 is an insufficient input sanitization vulnerability in backup functionality that allows authenticated users with teacher, manager, or a...

Mar 23, 2023
CVE-2020-0904
6.5

A denial of service vulnerability in Microsoft Hyper-V allows an attacker with privileged access on a guest virtual machine to crash the host server b...

Sep 11, 2020
CVE-2020-16216
6.5

This vulnerability in Philips IntelliVue patient monitors allows attackers to cause denial-of-service through system restarts by sending malformed inp...

Sep 11, 2020
CVE-2025-7507
6.4

The elink Embed Content WordPress plugin up to version 1.1.0 allows authenticated attackers with Contributor-level access or higher to inject maliciou...

Aug 15, 2025
CVE-2021-1482
6.4

This vulnerability allows authenticated remote attackers to bypass authorization checks in Cisco SD-WAN vManage's web management interface, potentiall...

Nov 15, 2024
CVE-2026-1691
6.3

This CVE describes a remote deserialization vulnerability in bolo-solo's SnakeYAML component that allows attackers to execute arbitrary code by manipu...

Jan 30, 2026
CVE-2026-21690
6.3

CVE-2026-21690 is a type confusion vulnerability in iccDEV's CIccTagXmlTagData::ToXml() function that could allow memory corruption when processing ma...

Jan 7, 2026
CVE-2025-15453
6.3

This vulnerability in Milvus allows remote attackers to execute arbitrary code through deserialization attacks via the HTTP endpoint. The vulnerabilit...

Jan 5, 2026
CVE-2025-15375
6.3

CVE-2025-15375 is a remote code execution vulnerability in EyouCMS versions up to 1.7.7, caused by insecure deserialization in the arcpagelist handler...

Dec 31, 2025
CVE-2025-15246
6.3

This vulnerability allows remote attackers to execute arbitrary code through deserialization attacks in aizuda snail-job's API component. It affects m...

Dec 30, 2025
CVE-2025-69205
6.3

This vulnerability in Micro Registration Utility (µURU) allows attackers to inject malicious characters into the Dial() application by crafting speci...

Dec 29, 2025
CVE-2025-53939
6.3

CVE-2025-53939 is an improper input validation vulnerability in Kiteworks private data network that allows attackers to elevate another user's permiss...

Nov 29, 2025
CVE-2025-12305
6.3

This vulnerability allows remote attackers to execute arbitrary code through insecure deserialization in the shiyi-blog application's job handler comp...

Oct 27, 2025
CVE-2025-11346
6.3

This CVE describes a remote deserialization vulnerability in ILIAS learning management systems. Attackers can exploit the Base64 Decoding Handler's un...

Oct 6, 2025
CVE-2025-10975
6.3

This vulnerability allows remote attackers to execute arbitrary code through deserialization attacks in the ZeroMQ component of GuanxingLu vlarl. It a...

Sep 25, 2025
CVE-2025-10974
6.3

This CVE describes a remote code execution vulnerability in giantspatula SewKinect's /calculate endpoint due to unsafe deserialization via pickle.load...

Sep 25, 2025
CVE-2025-10965
6.3

This vulnerability allows remote attackers to execute arbitrary code through insecure deserialization in LazyAGI LazyLLM's lazyllm_call function. Atta...

Sep 25, 2025
CVE-2025-10950
6.3

A remote code execution vulnerability exists in geyang ml-logger's ping handler due to unsafe deserialization of user-controlled data. Attackers can e...

Sep 25, 2025
CVE-2025-10771
6.3

This vulnerability in jeecgboot JimuReport allows remote attackers to execute arbitrary code through deserialization attacks via the DB2 JDBC Handler ...

Sep 21, 2025
CVE-2025-10770
6.3

This vulnerability allows remote attackers to exploit a deserialization flaw in jeecgboot JimuReport's MySQL JDBC handler. Attackers can execute arbit...

Sep 21, 2025
CVE-2025-10769
6.3

This vulnerability in h2oai h2o-3 allows remote attackers to execute arbitrary code through deserialization attacks via the H2 JDBC Driver's connectio...

Sep 21, 2025

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,663 CVEs classified as CWE-20, with 321 rated critical and 1,017 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.8.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free