CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,479
Total CVEs
255
Critical
898
High
7.7
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
145
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 100
2 Google 73
3 Intel 55
4 Qualcomm 43
5 Apache 43
6 Adobe 41
7 Color 40
8 Huawei 39
9 Reolink 36
10 Apple 33

All Improper Input Validation CVEs (1,479)

CVE-2023-31039
9.8

This vulnerability in Apache bRPC allows attackers to execute arbitrary code by manipulating the ServerOptions pid_file parameter. Attackers who can i...

May 8, 2023
CVE-2023-31047
9.8

This vulnerability allows attackers to bypass file upload validation in Django by submitting multiple files in a single form field. Only the last file...

May 7, 2023
CVE-2022-29606
9.8

A vulnerability in ONOS 2.5.1 allows network operators to create intents with large port numbers that cause system inconsistencies. When exploited, th...

Apr 20, 2023
CVE-2022-33211
9.8

CVE-2022-33211 is a critical memory corruption vulnerability in Qualcomm modem firmware caused by improper size calculation when serializing CoAP mess...

Apr 13, 2023
CVE-2023-21554
9.8

This vulnerability allows remote attackers to execute arbitrary code on systems running Microsoft Message Queuing (MSMQ) by sending specially crafted ...

Apr 11, 2023
CVE-2023-26068
9.8

This CVE describes an input validation vulnerability in Lexmark device embedded web servers that allows remote code execution. Attackers can exploit t...

Apr 10, 2023
CVE-2023-26070
9.8

This CVE describes an input validation vulnerability in certain Lexmark devices that could allow remote attackers to execute arbitrary code or cause d...

Apr 10, 2023
CVE-2023-1789
9.8

CVE-2023-1789 is an improper input validation vulnerability in Firefly III personal finance software that allows attackers to execute arbitrary code o...

Apr 1, 2023
CVE-2023-28731
9.8

This vulnerability allows unauthenticated attackers to execute arbitrary PHP code on Joomla websites using the AnyMailing plugin. Attackers can upload...

Mar 30, 2023
CVE-2023-23397
9.8

CVE-2023-23397 is a critical elevation of privilege vulnerability in Microsoft Outlook that allows attackers to steal NTLM hashes without user interac...

Mar 14, 2023
CVE-2021-35370
9.8

CVE-2021-35370 is a critical vulnerability in Peacexie Imcat v5.4 that allows attackers to execute arbitrary code due to incomplete input filtering. T...

Feb 24, 2023
CVE-2023-25693
9.8

This CVE-2023-25693 is an improper input validation vulnerability in Apache Airflow's Sqoop Provider that allows attackers to execute arbitrary code b...

Feb 24, 2023
CVE-2022-45088
9.8

This vulnerability allows attackers to include local PHP files on the server through improper input validation in Group Arge Energy and Control System...

Feb 12, 2023
CVE-2022-25729
9.8

CVE-2022-25729 is a critical memory corruption vulnerability in Qualcomm modem firmware caused by improper length checking during memory copy operatio...

Feb 12, 2023
CVE-2013-4144
9.8

CVE-2013-4144 is an object injection vulnerability in the SWFUpload plugin for WordPress that allows attackers to execute arbitrary code. This affects...

Jun 30, 2022
CVE-2022-33752
9.8

CVE-2022-33752 is a critical remote code execution vulnerability in CA Automic Automation agents due to insufficient input validation. Attackers can e...

Jun 16, 2022
CVE-2022-33754
9.8

CVE-2022-33754 is a critical remote code execution vulnerability in CA Automic Automation agents due to insufficient input validation. Attackers can e...

Jun 16, 2022
CVE-2022-25167
9.8

Apache Flume versions 1.4.0 through 1.9.0 are vulnerable to remote code execution when using JMS Source with JNDI LDAP data source URI. Attackers cont...

Jun 14, 2022
CVE-2022-25163
9.8

This vulnerability allows remote unauthenticated attackers to send specially crafted packets to Mitsubishi Electric PLCs, potentially causing denial o...

Jun 2, 2022
CVE-2021-33315
9.8

CVE-2021-33315 is a critical integer underflow vulnerability in TRENDnet TI-PG1284i switches that allows remote attackers to trigger buffer overflow o...

May 11, 2022
CVE-2022-29499
9.8

CVE-2022-29499 is a critical remote code execution vulnerability in Mitel MiVoice Connect's Service Appliance component due to improper input validati...

Apr 26, 2022
CVE-2022-28711
9.8

CVE-2022-28711 is a memory corruption vulnerability in the cgi.c unescape functionality of ArduPilot APWeb, allowing an attacker to send a specially-c...

Apr 14, 2022
CVE-2021-32974
9.8

CVE-2021-32974 is a critical remote code execution vulnerability in Moxa NPort IAW5000A-I/O series devices. Improper input validation in the built-in ...

Apr 1, 2022
CVE-2022-25757
9.8

This vulnerability allows attackers to bypass JSON validation in Apache APISIX by submitting requests with duplicate keys in JSON payloads. The valida...

Mar 28, 2022
CVE-2021-42786
9.8

CVE-2021-42786 allows remote attackers to execute arbitrary code on SteelCentral AppInternals Dynamic Sampling Agent (DSA) systems by sending maliciou...

Mar 10, 2022
CVE-2022-24720
9.8

CVE-2022-24720 is a critical command injection vulnerability in the image_processing Ruby gem that allows attackers to execute arbitrary shell command...

Mar 1, 2022
CVE-2022-24086
9.8

CVE-2022-24086 is a critical improper input validation vulnerability in Adobe Commerce (formerly Magento) that allows unauthenticated attackers to exe...

Feb 16, 2022
CVE-2022-23992
9.8

CVE-2022-23992 is a critical vulnerability in Broadcom XCOM Data Transport 11.6 that allows remote attackers to execute arbitrary commands with elevat...

Feb 14, 2022
CVE-2021-44530
9.8

This is the Log4Shell vulnerability (CVE-2021-44228) affecting UniFi Network software. It allows remote code execution via JNDI injection in Log4j, en...

Jan 14, 2022
CVE-2021-44548
9.8

This vulnerability in Apache Solr's DataImportHandler allows attackers to make SMB network calls from the Solr host to other systems by providing Wind...

Dec 23, 2021
CVE-2021-41844
9.8

CVE-2021-41844 is a critical vulnerability in Crocoblock JetEngine WordPress plugin where improper input validation allows attackers to inject malicio...

Dec 15, 2021
CVE-2021-37084
9.8

This CVE-2021-37084 is an improper input validation vulnerability in Huawei smartphones that allows attackers to invoke other functions of the Smart A...

Dec 7, 2021
CVE-2021-3943
9.8

This vulnerability allows remote attackers to execute arbitrary code on Moodle servers by exploiting improper input validation during backup file rest...

Nov 22, 2021
CVE-2011-4124
9.8

CVE-2011-4124 is a privilege escalation vulnerability in Calibre's Linux mount helper that allows local attackers to execute arbitrary commands with r...

Oct 27, 2021
CVE-2020-18683
9.8

CVE-2020-18683 is an input validation vulnerability in Floodlight SDN controller's StaticFlowEntryPusherResource.java that allows attackers to execute...

Sep 30, 2021
CVE-2020-18685
9.8

CVE-2020-18685 is an input validation vulnerability in Floodlight SDN controller that allows attackers to bypass security checks and potentially execu...

Sep 30, 2021
CVE-2021-34416
9.8

This vulnerability allows authenticated administrators of Zoom's on-premise web portal to execute arbitrary commands on the underlying system by sendi...

Sep 27, 2021
CVE-2021-37909
9.8

This vulnerability in the TSSServiSign component allows remote attackers to write arbitrary data to the Windows registry without proper permissions du...

Sep 15, 2021
CVE-2021-33199
9.8

This vulnerability in Expression Engine allows attackers to manipulate file paths through untrusted input, potentially leading to arbitrary file inclu...

Aug 12, 2021
CVE-2021-26606
9.8

This critical vulnerability in Dream Security's PKI Security Solution allows remote attackers to execute arbitrary commands on affected systems by sen...

Aug 6, 2021
CVE-2021-22444
9.8

CVE-2021-22444 is an input validation vulnerability in Huawei smartphones that allows attackers to inject and execute arbitrary code. This affects Hua...

Aug 2, 2021
CVE-2021-33527
9.8

CVE-2021-33527 is a critical input validation vulnerability in MB connect line mbDIALUP software that allows remote attackers to execute arbitrary cod...

Aug 2, 2021
CVE-2021-37595
9.8

This vulnerability in FreeRDP's Windows client allows remote code execution through improper input validation in clipboard file content requests. Atta...

Jul 30, 2021
CVE-2021-33592
9.8

CVE-2021-33592 is a critical remote code execution vulnerability in NAVER Toolbar that allows attackers to bypass code signing checks and execute arbi...

Jul 19, 2021
CVE-2021-1965
9.8

CVE-2021-1965 is a critical buffer overflow vulnerability in Qualcomm Snapdragon chipsets affecting multiple product lines. Attackers can exploit this...

Jul 13, 2021
CVE-2021-25434
9.8

This vulnerability allows attackers to execute arbitrary code on Tizen devices by exploiting improper input validation in the bootloader during wirele...

Jul 8, 2021
CVE-2021-25436
9.8

CVE-2021-25436 is an improper input validation vulnerability in Tizen's FOTA (Firmware Over-The-Air) service that allows arbitrary code execution via ...

Jul 8, 2021
CVE-2021-34427
9.8

This vulnerability allows remote attackers to execute arbitrary Java Server Pages (JSP) code on Eclipse BIRT servers by injecting malicious code throu...

Jun 25, 2021
CVE-2021-27388
9.8

This vulnerability in Siemens SINAMICS medium voltage products allows unauthenticated attackers to cause denial-of-service, execute limited configurat...

Jun 15, 2021
CVE-2021-22765
9.8

This vulnerability allows attackers to send specially crafted HTTP packets to PowerLogic EGX100 and EGX300 devices, potentially causing denial of serv...

Jun 11, 2021

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,479 CVEs classified as CWE-20, with 255 rated critical and 898 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free