CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,663
Total CVEs
321
Critical
1,017
High
7.8
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
149
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 104
2 Google 88
3 Cisco 72
4 Intel 62
5 Qualcomm 49
6 Apache 47
7 Adobe 42
8 Huawei 42
9 Apple 40
10 Color 40

All Improper Input Validation CVEs (1,663)

CVE-2025-8963
6.3

A remote deserialization vulnerability exists in jeecgboot JimuReport up to version 2.1.1, specifically in the Data Large Screen Template component's ...

Aug 14, 2025
CVE-2025-8266
6.3

This critical vulnerability in ChanCMS allows remote attackers to execute arbitrary code through deserialization of untrusted data in the getArticle f...

Jul 28, 2025
CVE-2025-5497
6.3

This vulnerability allows remote attackers to execute arbitrary code through deserialization of untrusted data in phpwcms's Feedimport module. Attacke...

Jun 3, 2025
CVE-2025-3590
6.3

CVE-2025-3590 is a critical remote deserialization vulnerability in Adianti Framework up to version 8.0. Attackers can exploit this to execute arbitra...

Apr 14, 2025
CVE-2025-2690
6.3

This critical vulnerability in Yii2 PHP framework allows remote attackers to execute arbitrary code through insecure deserialization in the phpunit mo...

Mar 24, 2025
CVE-2025-2622
6.3

A critical deserialization vulnerability in aizuda snail-job 1.4.0 allows remote attackers to execute arbitrary code by manipulating the nodeExpressio...

Mar 22, 2025
CVE-2024-38311
6.3

Apache Traffic Server has an improper input validation vulnerability that could allow attackers to cause denial of service or potentially execute arbi...

Mar 6, 2025
CVE-2025-1186
6.3

This critical vulnerability in XunRuiCMS allows remote attackers to execute arbitrary code through deserialization of the 'thumb' parameter in the Api...

Feb 12, 2025
CVE-2025-1113
6.3

This critical vulnerability in tarzan-cms allows remote attackers to execute arbitrary code through insecure deserialization in the theme upload funct...

Feb 7, 2025
CVE-2024-13136
6.3

This vulnerability allows remote attackers to execute arbitrary code through insecure deserialization in the rememberMeManager function of mysiteforme...

Jan 5, 2025
CVE-2024-12138
6.3

A critical deserialization vulnerability in horilla up to version 1.2.1 allows remote attackers to execute arbitrary code by manipulating specific fun...

Dec 4, 2024
CVE-2024-45871
6.3

BandiView 7.05 contains an incorrect access control vulnerability in the sub_0x232bd8 function that allows attackers to cause denial of service. This ...

Oct 3, 2024
CVE-2025-71011
6.2

An input validation vulnerability in OneFlow's tensor creation functions allows attackers to trigger a Denial of Service (DoS) by providing specially ...

Jan 29, 2026
CVE-2025-68964
6.2

A data verification vulnerability in the HiView module could allow attackers to disrupt system availability by sending malformed data. This affects Hu...

Jan 14, 2026
CVE-2025-61822
6.2

This CVE describes an Improper Input Validation vulnerability in Adobe ColdFusion that allows attackers to write arbitrary files to the file system wi...

Dec 10, 2025
CVE-2025-54614
6.2

This CVE describes an input validation vulnerability in Huawei's home screen module that could allow attackers to disrupt device functionality. Succes...

Aug 6, 2025
CVE-2025-29955
6.2

An improper input validation vulnerability in Windows Hyper-V allows local attackers to cause denial of service conditions. This affects systems runni...

May 13, 2025
CVE-2024-54101
6.2

A denial-of-service vulnerability in Huawei's installation module allows attackers to disrupt system availability by exploiting improper input validat...

Dec 12, 2024
CVE-2026-24348
6.1

Multiple cross-site scripting vulnerabilities in the Admin UI of EZCast Pro II allow attackers to inject and execute arbitrary JavaScript code in othe...

Jan 27, 2026
CVE-2025-68970
6.1

This CVE describes a permission verification bypass vulnerability in the media library module that allows unauthorized access to protected media conte...

Jan 14, 2026
CVE-2026-21503
6.1

This vulnerability in iccDEV allows attackers to trigger undefined behavior by exploiting a null pointer passed to memcpy() in CIccTagSparseMatrixArra...

Jan 7, 2026
CVE-2025-67163
6.1

A stored cross-site scripting (XSS) vulnerability in Simple Machines Forum v2.1.6 allows attackers to inject malicious scripts into the Forum Name par...

Dec 18, 2025
CVE-2025-67170
6.1

A reflected cross-site scripting vulnerability in RiteCMS v3.1.0 allows attackers to inject malicious scripts via crafted URLs. When users click malic...

Dec 17, 2025
CVE-2025-63785
6.1

A DOM-based XSS vulnerability in Onlook web application 0.2.32 allows attackers to inject malicious scripts through the text editor feature. When user...

Nov 7, 2025
CVE-2025-12284
6.1

This vulnerability in BLU-IC2 and BLU-IC4 web interfaces allows attackers to submit malicious input due to insufficient validation. It affects all ver...

Oct 26, 2025
CVE-2025-12001
6.1

This vulnerability allows attackers to inject malicious scripts into application manifests, which could lead to stored cross-site scripting (XSS) atta...

Oct 20, 2025
CVE-2025-27131
6.1

This CVE describes an improper input validation vulnerability in OpenHarmony that allows a local attacker to cause a denial of service (DoS) condition...

Jun 8, 2025
CVE-2024-39606
6.1

This vulnerability allows an unauthenticated attacker on the same network segment to potentially cause denial of service by sending specially crafted ...

Feb 12, 2025
CVE-2024-37027
6.1

This vulnerability in Intel VTune Profiler allows authenticated users with local access to potentially cause denial of service through improper input ...

Nov 13, 2024
CVE-2024-5913
6.1

An improper input validation vulnerability in Palo Alto Networks PAN-OS software allows attackers with physical file system access to elevate privileg...

Jul 10, 2024
CVE-2024-32990
6.1

This CVE describes a permission verification vulnerability in Huawei's system sharing pop-up module. Successful exploitation could allow attackers to ...

May 14, 2024
CVE-2023-47855
6.0

This vulnerability in Intel TDX module software allows a privileged user with local access to potentially escalate privileges due to improper input va...

May 16, 2024
CVE-2025-47888
5.9

The Jenkins DingTalk Plugin 2.7.3 and earlier disables SSL/TLS certificate validation for DingTalk webhook connections, allowing man-in-the-middle att...

May 14, 2025
CVE-2024-9042
5.9

This CVE describes a vulnerability in Kubernetes Windows worker nodes where improper input validation (CWE-20) could allow an attacker to disrupt node...

Mar 13, 2025
CVE-2025-21350
5.9

This Windows Kerberos vulnerability allows attackers to cause a denial of service by sending specially crafted requests to affected systems. It affect...

Feb 11, 2025
CVE-2024-49753
5.9

This vulnerability in Zitadel identity infrastructure software allows attackers to bypass URL validation restrictions and send requests to localhost (...

Oct 25, 2024
CVE-2023-48368
5.9

This vulnerability in Intel Media SDK allows authenticated local users to trigger a denial of service condition through improper input validation. It ...

May 16, 2024
CVE-2025-12718
5.8

The Quick Contact Form WordPress plugin contains an open mail relay vulnerability that allows unauthenticated attackers to send emails with arbitrary ...

Jan 17, 2026
CVE-2025-33043
5.8

This CVE describes an improper input validation vulnerability in AMI APTIOV BIOS firmware. An attacker with local access can exploit this to potential...

May 29, 2025
CVE-2025-20183
5.8

This vulnerability allows unauthenticated remote attackers to bypass the antivirus scanner on Cisco Secure Web Appliance by sending crafted HTTP range...

Feb 5, 2025
CVE-2025-23041
5.8

Umbraco.Forms has a vulnerability where character limits for form fields are only enforced client-side, not server-side. This allows attackers to bypa...

Jan 14, 2025
CVE-2024-38483
5.8

Dell BIOS contains an improper input validation vulnerability in an externally developed component that allows a high-privileged attacker with local a...

Aug 14, 2024
CVE-2023-22662
5.8

This vulnerability in UEFI firmware for certain Intel Server Board S2600BP products allows a privileged user with local access to trigger denial of se...

May 16, 2024
CVE-2019-0715
5.8

This vulnerability allows a privileged attacker on a Hyper-V guest virtual machine to crash the host server by sending specially crafted network packe...

Aug 14, 2019
CVE-2019-0717
5.8

A denial-of-service vulnerability in Microsoft Hyper-V Network Switch allows a privileged attacker on a guest virtual machine to crash the host server...

Aug 14, 2019
CVE-2025-33191
5.7

This vulnerability in NVIDIA DGX Spark GB10's OSROOT firmware allows attackers to trigger invalid memory reads, potentially causing denial of service....

Nov 25, 2025
CVE-2024-28049
5.7

This vulnerability allows an unauthenticated attacker on the same network to cause denial of service by sending specially crafted packets to affected ...

Nov 13, 2024
CVE-2025-24512
5.6

An improper input validation vulnerability in Intel PROSet/Wireless WiFi Software for Windows allows an authenticated attacker with local access and s...

Nov 11, 2025
CVE-2025-11938
5.6

A deserialization vulnerability in ChurchCRM's setup.php file allows remote attackers to potentially execute arbitrary code by manipulating DB_PASSWOR...

Oct 19, 2025
CVE-2025-7099
5.6

This vulnerability in BoyunCMS allows remote attackers to execute arbitrary code through deserialization of untrusted data in the installation handler...

Jul 7, 2025

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,663 CVEs classified as CWE-20, with 321 rated critical and 1,017 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.8.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free