CWE-20: Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Yearly Trend
Top Affected Vendors
All Improper Input Validation CVEs (1,686)
Adobe InDesign has an improper input validation vulnerability that allows attackers to cause denial-of-service by crashing the application. Users must...
Feb 11, 2025This vulnerability in Windows Virtual Trusted Platform Module allows attackers to cause a denial of service by sending specially crafted requests. It ...
Jan 14, 2025This vulnerability allows attackers to bypass access permission checks in the camera driver module, potentially causing denial of service. It affects ...
Sep 4, 2024This CVE describes an access permission verification vulnerability in Huawei's WMS module that could allow unauthorized access to sensitive informatio...
Sep 4, 2024A local attacker with CLI access can crash the 802.1X authentication daemon on vulnerable Juniper Junos OS devices by running a specific operational c...
Jul 10, 2024A local privilege escalation vulnerability in Juniper Junos OS Evolved allows low-privileged users to crash the Packet Forwarding Engine by running a ...
Jul 10, 2024This CVE describes an environment variable validation vulnerability in Apple operating systems that could allow malicious applications to access sensi...
Jun 10, 2024CVE-2026-26952 is a stored HTML injection vulnerability in Pi-hole Admin Interface versions 6.4 and below. Authenticated administrators can inject mal...
Feb 19, 2026Group-Office versions 6.8.148 and below, and 25.0.1 through 25.0.79 have a stored XSS vulnerability where unsanitized filenames are stored in the data...
Jan 22, 2026This vulnerability allows remote attackers to bypass Chrome's dangerous file type protections on Windows systems. Attackers can trick users into downl...
Jan 20, 2026A type confusion vulnerability in iccDEV's CIccTag::IsTypeCompressed() function allows attackers to potentially execute arbitrary code or cause denial...
Jan 7, 2026This CVE describes an XML validation vulnerability in unspecified products that could allow cross-site scripting (XSS) attacks. Attackers could inject...
Dec 26, 2025This TLS 1.2 vulnerability allows clients to use weaker cryptographic digests during certificate authentication than what the server requested, potent...
Nov 22, 2025This vulnerability allows attackers to spoof domains in Chrome for Android downloads by tricking users with malicious HTML pages. It affects Android u...
Nov 8, 2025This CVE describes an improper input validation vulnerability in the Mediawiki Growth Experiments extension that allows cross-site scripting (XSS) att...
Apr 11, 2025This CVE describes a cross-site scripting (XSS) vulnerability in the Mediawiki Wikibase Media Info Extension caused by improper input validation. Atta...
Apr 11, 2025This CVE describes an improper input validation vulnerability in the MediaWiki Wikidata Extension that allows cross-site scripting (XSS) attacks. Atta...
Apr 11, 2025This CVE describes an improper input validation vulnerability in MediaWiki's HTML Tags extension that allows cross-site scripting (XSS) attacks. Attac...
Apr 11, 2025Dell OpenManage Server Administrator (OMSA) versions 11.0.1.0 and prior contain an improper input validation vulnerability that allows remote low-priv...
Dec 9, 2024This vulnerability allows attackers to inject HTML content into the password reset page via URL parameters. This affects all users accessing the vulne...
Jul 25, 2024This vulnerability in Ruby on Rails Action Pack causes the Permissions-Policy HTTP header to be omitted from non-HTML responses, potentially allowing ...
Jun 4, 2024Remote attackers can inject control characters into the ueId parameter of free5gc UDM's Nudm_UECM service, causing URL parsing errors that expose syst...
Feb 24, 2026Improper input validation in the Admin UI of EZCast Pro II version 1.17478.146 allows attackers to manipulate files in the /tmp directory. This vulner...
Jan 27, 2026A denial-of-service vulnerability in Swift W3C TraceContext and Swift OTel allows remote attackers to crash services by sending malformed HTTP headers...
Jan 19, 2026The TI WooCommerce Wishlist plugin for WordPress is vulnerable to HTML injection, allowing unauthenticated attackers to inject arbitrary HTML into wis...
Dec 13, 2025CVE-2025-66400 is a vulnerability in mdast-util-to-hast versions 13.0.0 through 13.2.0 that allows attackers to inject multiple unprefixed classnames ...
Dec 1, 2025A denial-of-service vulnerability in wolfSSL v5.8.2 allows remote attackers to crash TLS 1.3 connections by sending malicious ClientHello messages wit...
Nov 21, 2025This vulnerability allows unauthenticated attackers to send appointment notification emails with attacker-controlled content through the WordPress Boo...
Nov 19, 2025This vulnerability in Mintty terminal emulator allows attackers to force the application to access arbitrary network paths via malicious escape sequen...
Nov 12, 2025ThinkDashboard versions 0.6.7 and below contain an arbitrary file upload vulnerability in the backup import feature. Attackers can bypass client-side ...
Nov 6, 2025An input validation flaw in the 'ate' service of Tenda AC10 routers allows unauthenticated attackers to send crafted UDP packets to escalate privilege...
Aug 28, 2025This vulnerability allows attackers to bypass JDBC URL validation in Apache Zeppelin by using URL-encoded input, potentially enabling unauthorized dat...
Aug 3, 2025The WoodMart WordPress theme has an input validation vulnerability that allows unauthenticated attackers to manipulate shopping cart quantities using ...
Jul 26, 2025This vulnerability in HumanSignal label-studio-ml-backend allows local attackers to execute arbitrary code through unsafe deserialization in the PT fi...
May 26, 2025This vulnerability allows local attackers to execute arbitrary code through unsafe deserialization in the load_qc_pickl function of basestation3's QC....
May 19, 2025This vulnerability in VITA-MLLM Freeze-Omni allows arbitrary code execution through unsafe deserialization in the torch.load function. Attackers can e...
May 15, 2025This vulnerability allows attackers to create malicious OOXML files (like Excel, Word, or PowerPoint documents) with duplicate zip entries that can ca...
Apr 9, 2025This vulnerability allows local attackers to execute arbitrary code through unsafe deserialization in the thu-pacman chitu package. Attackers can expl...
Apr 3, 2025The Post Grid and Gutenberg Blocks – ComboBlocks WordPress plugin has an input validation vulnerability that allows unauthenticated attackers to cre...
Feb 22, 2025This vulnerability involves improper input validation in UEFI firmware for certain Intel processors, allowing a privileged user with local access to p...
Feb 12, 2025This vulnerability in Misskey allows attackers to manipulate 'origin' links in notes and user profiles to point to arbitrary HTTPS URLs, even on diffe...
Dec 18, 2024Synapse versions before 1.120.1 fail to properly validate invites received over federation, allowing a malicious server to send specially crafted invi...
Dec 3, 2024This vulnerability allows untrusted users to inject Contao insert tags into canonical URL tags, which are then processed and rendered on the front-end...
Sep 17, 2024A segmentation fault vulnerability in Samsung's Escargot JavaScript engine allows remote attackers to cause denial of service through specially crafte...
May 14, 2024This vulnerability in O-RAN Near-RT RIC's appmgr allows attackers to register unintended RMR message types during xApp registration, potentially disru...
May 4, 2024This Windows Kernel vulnerability allows local attackers to read sensitive kernel memory due to improper input validation. It affects Windows systems ...
Oct 14, 2025TinyEnv versions 1.0.9-1.0.10 fail to properly strip inline comments from .env file values, causing environment variables to contain unintended charac...
Sep 9, 2025This vulnerability in Android's BroadcastController allows malicious apps to intercept system broadcasts intended only for the Android framework due t...
Sep 4, 2025Emerson ValveLink products contain an input validation vulnerability (CWE-20) that could allow attackers to send malformed data to the system. This af...
Jul 11, 2025A deserialization vulnerability in JeecgBoot 3.9.1 allows remote attackers to execute arbitrary code by manipulating the importDocumentFromZip functio...
Feb 16, 2026About Improper Input Validation (CWE-20)
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Our database tracks 1,686 CVEs classified as CWE-20, with 341 rated critical and 1,020 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.8.
External reference: View CWE-20 on MITRE CWE →
Monitor Improper Input Validation Vulnerabilities
Get alerted when new Improper Input Validation CVEs affect your infrastructure.
Start Monitoring Free