CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,700
Total CVEs
344
Critical
1,031
High
7.8
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
150
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 107
2 Google 92
3 Cisco 73
4 Intel 66
5 Qualcomm 49
6 Apache 47
7 Huawei 43
8 Adobe 42
9 Apple 41
10 Color 40

All Improper Input Validation CVEs (1,700)

CVE-2025-31672
5.3

This vulnerability allows attackers to create malicious OOXML files (like Excel, Word, or PowerPoint documents) with duplicate zip entries that can ca...

Apr 9, 2025
CVE-2025-3165
5.3

This vulnerability allows local attackers to execute arbitrary code through unsafe deserialization in the thu-pacman chitu package. Attackers can expl...

Apr 3, 2025
CVE-2024-13798
5.3

The Post Grid and Gutenberg Blocks – ComboBlocks WordPress plugin has an input validation vulnerability that allows unauthenticated attackers to cre...

Feb 22, 2025
CVE-2024-28047
5.3

This vulnerability involves improper input validation in UEFI firmware for certain Intel processors, allowing a privileged user with local access to p...

Feb 12, 2025
CVE-2024-52593
5.3

This vulnerability in Misskey allows attackers to manipulate 'origin' links in notes and user profiles to point to arbitrary HTTPS URLs, even on diffe...

Dec 18, 2024
CVE-2024-52815
5.3

Synapse versions before 1.120.1 fail to properly validate invites received over federation, allowing a malicious server to send specially crafted invi...

Dec 3, 2024
CVE-2024-45612
5.3

This vulnerability allows untrusted users to inject Contao insert tags into canonical URL tags, which are then processed and rendered on the front-end...

Sep 17, 2024
CVE-2024-32672
5.3

A segmentation fault vulnerability in Samsung's Escargot JavaScript engine allows remote attackers to cause denial of service through specially crafte...

May 14, 2024
CVE-2024-34473
5.3

This vulnerability in O-RAN Near-RT RIC's appmgr allows attackers to register unintended RMR message types during xApp registration, potentially disru...

May 4, 2024
CVE-2025-55679
5.1

This Windows Kernel vulnerability allows local attackers to read sensitive kernel memory due to improper input validation. It affects Windows systems ...

Oct 14, 2025
CVE-2025-58759
5.1

TinyEnv versions 1.0.9-1.0.10 fail to properly strip inline comments from .env file values, causing environment variables to contain unintended charac...

Sep 9, 2025
CVE-2025-26426
5.1

This vulnerability in Android's BroadcastController allows malicious apps to intercept system broadcasts intended only for the Android framework due t...

Sep 4, 2025
CVE-2025-53471
5.1

Emerson ValveLink products contain an input validation vulnerability (CWE-20) that could allow attackers to send malformed data to the system. This af...

Jul 11, 2025
CVE-2026-2555
5.0

A deserialization vulnerability in JeecgBoot 3.9.1 allows remote attackers to execute arbitrary code by manipulating the importDocumentFromZip functio...

Feb 16, 2026
CVE-2025-15222
5.0

This vulnerability in Dromara Sa-Token allows remote attackers to execute arbitrary code through insecure deserialization in the SaSerializerTemplateF...

Dec 30, 2025
CVE-2025-14606
5.0

This vulnerability allows remote attackers to execute arbitrary code through insecure deserialization in tiny-rdm's pickle decoding functionality. Att...

Dec 13, 2025
CVE-2025-8708
5.0

This vulnerability in Antabot White-Jotter 0.22 allows remote attackers to execute arbitrary code through deserialization of untrusted data in the Coo...

Aug 8, 2025
CVE-2021-1464
5.0

This vulnerability in Cisco SD-WAN vManage Software allows authenticated remote attackers to bypass authorization checks and access restricted configu...

Nov 15, 2024
CVE-2024-51519
5.0

This CVE describes an input validation vulnerability in Huawei's HDC module where parameters are not properly verified. Attackers could exploit this t...

Nov 5, 2024
CVE-2026-29791
4.9

Agentgateway versions before 0.12.0 fail to sanitize input path, query, and header values when converting MCP tools/call requests to OpenAPI requests....

Mar 6, 2026
CVE-2025-54250
4.9

Adobe Experience Manager versions 6.5.23.0 and earlier contain an improper input validation vulnerability that allows high-privileged attackers to byp...

Sep 9, 2025
CVE-2025-49081
4.9

An insufficient input validation vulnerability in Absolute Secure Access warehouse component allows attackers with system administrator permissions to...

Jun 12, 2025
CVE-2025-26702
4.9

An improper input validation vulnerability in ZTE GoldenDB allows attackers to manipulate input data, potentially leading to unauthorized data modific...

Mar 11, 2025
CVE-2021-1470
4.9

This SQL injection vulnerability in Cisco SD-WAN vManage allows authenticated attackers to execute malicious SQL queries against the database. It affe...

Nov 15, 2024
CVE-2024-37346
4.9

This vulnerability allows attackers with system administrator permissions to impair the availability of certain elements of the Secure Access administ...

Jun 20, 2024
CVE-2025-58114
4.8

This CVE describes an improper input validation vulnerability in BlueSpice's CognitiveProcessDesigner extension that allows cross-site scripting (XSS)...

Sep 19, 2025
CVE-2025-24513
4.8

A directory traversal vulnerability in ingress-nginx's Admission Controller allows attackers to manipulate filenames to access files outside intended ...

Mar 25, 2025
CVE-2025-0660
4.8

Concrete CMS versions 9.0.0 through 9.3.9 contain a stored cross-site scripting (XSS) vulnerability in the 'Add Folder' functionality. A rogue adminis...

Mar 10, 2025
CVE-2024-11636
4.8

This vulnerability allows high-privilege WordPress users (like administrators) to inject malicious scripts into Text Block options in the Email Subscr...

Jan 13, 2025
CVE-2024-11234
4.8

This PHP vulnerability allows attackers to perform HTTP request smuggling when using streams with proxy configurations and the 'request_fulluri' optio...

Nov 24, 2024
CVE-2024-20405
4.8

This vulnerability in Cisco Finesse's web management interface allows an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS...

Jun 5, 2024
CVE-2025-15438
4.7

This vulnerability in PluXml's Media Management Module allows remote attackers to execute arbitrary code through deserialization of manipulated file a...

Jan 2, 2026
CVE-2025-27151
4.7

This CVE describes a stack-based buffer overflow vulnerability in Redis's redis-check-aof tool, affecting versions 7.0.0 to 8.0.1. It allows an attack...

May 29, 2025
CVE-2025-2855
4.7

A deserialization vulnerability in elunez eladmin's file upload function allows remote attackers to manipulate server arguments. This affects eladmin ...

Mar 27, 2025
CVE-2025-1741
4.7

This vulnerability in b1gMail allows remote attackers to perform deserialization attacks via the query/q parameter in the admin users.php file. It aff...

Feb 27, 2025
CVE-2025-1556
4.7

A remote deserialization vulnerability exists in westboy CicadasCMS 1.0's Template Management component at /system. Attackers can exploit this to exec...

Feb 22, 2025
CVE-2025-0734
4.7

This vulnerability in RuoYi up to version 4.8.0 allows remote attackers to execute arbitrary code through deserialization in the getBeanName function ...

Jan 27, 2025
CVE-2024-9407
4.7

This vulnerability in Docker's RUN --mount instruction allows attackers to bypass input validation and mount arbitrary host directories into container...

Oct 1, 2024
CVE-2023-47210
4.7

An improper input validation vulnerability in Intel PROSet/Wireless WiFi software for Linux allows unauthenticated attackers on the same network to po...

May 16, 2024
CVE-2020-3538
4.6

This vulnerability in Cisco Data Center Network Manager (DCNM) allows authenticated remote attackers to perform path traversal attacks via a specific ...

Nov 18, 2024
CVE-2026-22220
4.5

This vulnerability allows a network-adjacent attacker with administrative access to send specially crafted HTTP requests to the TP-Link Archer BE230 r...

Feb 3, 2026
CVE-2025-55058
4.5

This vulnerability involves improper input validation (CWE-20) that could allow attackers to submit malicious data to affected systems. The specific i...

Nov 17, 2025
CVE-2025-24847
4.5

This vulnerability in Intel CIP software allows unprivileged software combined with a privileged user to potentially disclose information via improper...

Nov 11, 2025
CVE-2025-20056
4.4

This CVE describes an improper input validation vulnerability in Intel VTune Profiler that allows authenticated local users to escalate privileges. At...

Nov 11, 2025
CVE-2025-54636
4.4

This CVE describes a buffer overflow vulnerability in the kernel drop detection module caused by insufficient input validation. Successful exploitatio...

Aug 6, 2025
CVE-2024-51741
4.4

An authenticated attacker with sufficient privileges can create a malformed ACL selector in Redis that triggers a server panic when accessed, causing ...

Jan 6, 2025
CVE-2024-11985
4.4

An improper input validation vulnerability in certain ASUS router models allows attackers to send specially crafted input that crashes the device. Thi...

Dec 4, 2024
CVE-2024-22390
4.4

This vulnerability affects Intel FPGA products with firmware versions before 2.9.1. Improper input validation could allow attackers to cause denial of...

May 16, 2024
CVE-2026-25941
4.3

FreeRDP clients have an out-of-bounds read vulnerability in the RDPGFX channel that allows malicious RDP servers to read uninitialized heap memory. Th...

Feb 25, 2026
CVE-2025-46266
4.3

This vulnerability in TeamViewer DEX Client's Content Distribution Service allows attackers to redirect the service to send data to arbitrary internal...

Dec 11, 2025

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,700 CVEs classified as CWE-20, with 344 rated critical and 1,031 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.8.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free