CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,674
Total CVEs
331
Critical
1,018
High
7.8
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
150
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 105
2 Google 88
3 Cisco 72
4 Intel 62
5 Qualcomm 49
6 Apache 47
7 Huawei 43
8 Adobe 42
9 Apple 40
10 Color 40

All Improper Input Validation CVEs (1,674)

CVE-2025-20183
5.8

This vulnerability allows unauthenticated remote attackers to bypass the antivirus scanner on Cisco Secure Web Appliance by sending crafted HTTP range...

Feb 5, 2025
CVE-2025-23041
5.8

Umbraco.Forms has a vulnerability where character limits for form fields are only enforced client-side, not server-side. This allows attackers to bypa...

Jan 14, 2025
CVE-2024-38483
5.8

Dell BIOS contains an improper input validation vulnerability in an externally developed component that allows a high-privileged attacker with local a...

Aug 14, 2024
CVE-2023-22662
5.8

This vulnerability in UEFI firmware for certain Intel Server Board S2600BP products allows a privileged user with local access to trigger denial of se...

May 16, 2024
CVE-2019-0715
5.8

This vulnerability allows a privileged attacker on a Hyper-V guest virtual machine to crash the host server by sending specially crafted network packe...

Aug 14, 2019
CVE-2019-0717
5.8

A denial-of-service vulnerability in Microsoft Hyper-V Network Switch allows a privileged attacker on a guest virtual machine to crash the host server...

Aug 14, 2019
CVE-2025-33191
5.7

This vulnerability in NVIDIA DGX Spark GB10's OSROOT firmware allows attackers to trigger invalid memory reads, potentially causing denial of service....

Nov 25, 2025
CVE-2024-28049
5.7

This vulnerability allows an unauthenticated attacker on the same network to cause denial of service by sending specially crafted packets to affected ...

Nov 13, 2024
CVE-2025-24512
5.6

An improper input validation vulnerability in Intel PROSet/Wireless WiFi Software for Windows allows an authenticated attacker with local access and s...

Nov 11, 2025
CVE-2025-11938
5.6

A deserialization vulnerability in ChurchCRM's setup.php file allows remote attackers to potentially execute arbitrary code by manipulating DB_PASSWOR...

Oct 19, 2025
CVE-2025-7099
5.6

This vulnerability in BoyunCMS allows remote attackers to execute arbitrary code through deserialization of untrusted data in the installation handler...

Jul 7, 2025
CVE-2024-6978
5.6

The Cato Networks Windows SDP Client allows low-privileged users to install local root certificates, potentially enabling man-in-the-middle attacks or...

Jul 31, 2024
CVE-2024-3488
5.6

This CVE describes an unauthenticated file upload vulnerability in OpenText iManager 3.2.6.0200. Attackers can upload arbitrary files without authenti...

May 15, 2024
CVE-2026-2898
5.5

This vulnerability allows remote attackers to execute arbitrary code through insecure deserialization in funadmin's AuthCloudService.php. Attackers ca...

Feb 22, 2026
CVE-2026-20627
5.5

This CVE describes an environment variable handling vulnerability in Apple operating systems that could allow malicious apps to access sensitive user ...

Feb 11, 2026
CVE-2026-21258
5.5

This vulnerability in Microsoft Office Excel allows an attacker to exploit improper input validation to access sensitive information from the local sy...

Feb 10, 2026
CVE-2025-65264
5.5

A vulnerability in CPUID CPU-Z's kernel driver allows attackers to read sensitive kernel memory through unvalidated IOCTL requests. This affects all u...

Jan 27, 2026
CVE-2026-21501
5.5

CVE-2026-21501 is a stack overflow vulnerability in iccDEV's calculator parser that could allow attackers to execute arbitrary code or cause denial of...

Jan 7, 2026
CVE-2026-21502
5.5

CVE-2026-21502 is a NULL pointer dereference vulnerability in iccDEV's XML tag parser that can cause application crashes or denial of service. This af...

Jan 7, 2026
CVE-2026-21505
5.5

CVE-2026-21505 is an undefined behavior vulnerability in iccDEV color management libraries caused by an invalid enum value. This could potentially lea...

Jan 7, 2026
CVE-2026-21506
5.5

This CVE describes a null pointer dereference vulnerability in iccDEV's CIccProfileXml::ParseBasic() function that can cause denial of service. Attack...

Jan 7, 2026
CVE-2026-21495
5.5

A division by zero vulnerability exists in iccDEV's TIFF Image Reader component, which could cause application crashes or denial of service when proce...

Jan 7, 2026
CVE-2026-21496
5.5

CVE-2026-21496 is a NULL pointer dereference vulnerability in iccDEV's signature parser that can cause denial of service. This affects applications us...

Jan 7, 2026
CVE-2026-21497
5.5

A NULL pointer dereference vulnerability in iccDEV's unknown tag parser allows attackers to cause denial of service by crashing applications using the...

Jan 7, 2026
CVE-2026-21498
5.5

A NULL pointer dereference vulnerability exists in iccDEV's XML calculator parser before version 2.3.1.2. This vulnerability could cause application c...

Jan 7, 2026
CVE-2026-21499
5.5

CVE-2026-21499 is a NULL pointer dereference vulnerability in iccDEV's XML parser that can cause application crashes or denial of service. This affect...

Jan 7, 2026
CVE-2026-21500
5.5

CVE-2026-21500 is a stack overflow vulnerability in iccDEV's XML calculator macro expansion that could allow attackers to execute arbitrary code or ca...

Jan 7, 2026
CVE-2025-43482
5.5

This CVE describes an input validation vulnerability in macOS that allows an app to cause denial-of-service conditions. The issue affects macOS Tahoe,...

Dec 12, 2025
CVE-2025-36929
5.5

This vulnerability in Android's graphics subsystem allows local information disclosure without requiring user interaction or elevated privileges. It a...

Dec 11, 2025
CVE-2025-48601
5.5

This CVE describes an improper input validation vulnerability in Android that allows local attackers to cause permanent denial of service and potentia...

Dec 8, 2025
CVE-2025-64747
5.5

A stored cross-site scripting (XSS) vulnerability in Directus allows authenticated users with file upload and edit permissions to inject malicious Jav...

Nov 13, 2025
CVE-2025-43348
5.5

This CVE describes a Gatekeeper bypass vulnerability in macOS that allows malicious applications to circumvent security checks. The vulnerability affe...

Nov 4, 2025
CVE-2025-43375
5.5

This vulnerability in Xcode allows an attacker to cause a denial-of-service by providing an overly large path value, which crashes the process. It aff...

Sep 15, 2025
CVE-2025-43293
5.5

This CVE describes an input validation vulnerability in macOS that could allow malicious applications to access sensitive user data. The vulnerability...

Sep 15, 2025
CVE-2025-48559
5.5

This CVE describes an improper input validation vulnerability in Android's AppOpsService that allows local attackers to add excessive app operations, ...

Sep 4, 2025
CVE-2025-26429
5.5

This vulnerability in Android's AppOpsService allows local attackers to cause permanent denial of service through improper input validation in the col...

Sep 4, 2025
CVE-2025-27537
5.5

This vulnerability in Intel Tiber Edge Platform's Edge Orchestrator allows authenticated users to potentially escalate privileges through adjacent net...

Aug 12, 2025
CVE-2025-3622
5.5

A critical deserialization vulnerability in Xorbits Inference allows attackers to execute arbitrary code by manipulating the load function in the cosy...

Apr 15, 2025
CVE-2025-21126
5.5

Adobe InDesign has an improper input validation vulnerability that allows attackers to cause denial-of-service by crashing the application. Users must...

Feb 11, 2025
CVE-2025-21284
5.5

This vulnerability in Windows Virtual Trusted Platform Module allows attackers to cause a denial of service by sending specially crafted requests. It ...

Jan 14, 2025
CVE-2024-45446
5.5

This vulnerability allows attackers to bypass access permission checks in the camera driver module, potentially causing denial of service. It affects ...

Sep 4, 2024
CVE-2024-45444
5.5

This CVE describes an access permission verification vulnerability in Huawei's WMS module that could allow unauthorized access to sensitive informatio...

Sep 4, 2024
CVE-2024-39511
5.5

A local attacker with CLI access can crash the 802.1X authentication daemon on vulnerable Juniper Junos OS devices by running a specific operational c...

Jul 10, 2024
CVE-2024-39513
5.5

A local privilege escalation vulnerability in Juniper Junos OS Evolved allows low-privileged users to crash the Packet Forwarding Engine by running a ...

Jul 10, 2024
CVE-2024-27805
5.5

This CVE describes an environment variable validation vulnerability in Apple operating systems that could allow malicious applications to access sensi...

Jun 10, 2024
CVE-2026-26952
5.4

CVE-2026-26952 is a stored HTML injection vulnerability in Pi-hole Admin Interface versions 6.4 and below. Authenticated administrators can inject mal...

Feb 19, 2026
CVE-2026-23887
5.4

Group-Office versions 6.8.148 and below, and 25.0.1 through 25.0.79 have a stored XSS vulnerability where unsanitized filenames are stored in the data...

Jan 22, 2026
CVE-2026-0903
5.4

This vulnerability allows remote attackers to bypass Chrome's dangerous file type protections on Windows systems. Attackers can trick users into downl...

Jan 20, 2026
CVE-2026-21691
5.4

A type confusion vulnerability in iccDEV's CIccTag::IsTypeCompressed() function allows attackers to potentially execute arbitrary code or cause denial...

Jan 7, 2026
CVE-2025-8075
5.4

This CVE describes an XML validation vulnerability in unspecified products that could allow cross-site scripting (XSS) attacks. Attackers could inject...

Dec 26, 2025

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,674 CVEs classified as CWE-20, with 331 rated critical and 1,018 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.8.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free