CWE-20: Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Yearly Trend
Top Affected Vendors
All Improper Input Validation CVEs (1,700)
This vulnerability allows attackers to create malicious OOXML files (like Excel, Word, or PowerPoint documents) with duplicate zip entries that can ca...
Apr 9, 2025This vulnerability allows local attackers to execute arbitrary code through unsafe deserialization in the thu-pacman chitu package. Attackers can expl...
Apr 3, 2025The Post Grid and Gutenberg Blocks – ComboBlocks WordPress plugin has an input validation vulnerability that allows unauthenticated attackers to cre...
Feb 22, 2025This vulnerability involves improper input validation in UEFI firmware for certain Intel processors, allowing a privileged user with local access to p...
Feb 12, 2025This vulnerability in Misskey allows attackers to manipulate 'origin' links in notes and user profiles to point to arbitrary HTTPS URLs, even on diffe...
Dec 18, 2024Synapse versions before 1.120.1 fail to properly validate invites received over federation, allowing a malicious server to send specially crafted invi...
Dec 3, 2024This vulnerability allows untrusted users to inject Contao insert tags into canonical URL tags, which are then processed and rendered on the front-end...
Sep 17, 2024A segmentation fault vulnerability in Samsung's Escargot JavaScript engine allows remote attackers to cause denial of service through specially crafte...
May 14, 2024This vulnerability in O-RAN Near-RT RIC's appmgr allows attackers to register unintended RMR message types during xApp registration, potentially disru...
May 4, 2024This Windows Kernel vulnerability allows local attackers to read sensitive kernel memory due to improper input validation. It affects Windows systems ...
Oct 14, 2025TinyEnv versions 1.0.9-1.0.10 fail to properly strip inline comments from .env file values, causing environment variables to contain unintended charac...
Sep 9, 2025This vulnerability in Android's BroadcastController allows malicious apps to intercept system broadcasts intended only for the Android framework due t...
Sep 4, 2025Emerson ValveLink products contain an input validation vulnerability (CWE-20) that could allow attackers to send malformed data to the system. This af...
Jul 11, 2025A deserialization vulnerability in JeecgBoot 3.9.1 allows remote attackers to execute arbitrary code by manipulating the importDocumentFromZip functio...
Feb 16, 2026This vulnerability in Dromara Sa-Token allows remote attackers to execute arbitrary code through insecure deserialization in the SaSerializerTemplateF...
Dec 30, 2025This vulnerability allows remote attackers to execute arbitrary code through insecure deserialization in tiny-rdm's pickle decoding functionality. Att...
Dec 13, 2025This vulnerability in Antabot White-Jotter 0.22 allows remote attackers to execute arbitrary code through deserialization of untrusted data in the Coo...
Aug 8, 2025This vulnerability in Cisco SD-WAN vManage Software allows authenticated remote attackers to bypass authorization checks and access restricted configu...
Nov 15, 2024This CVE describes an input validation vulnerability in Huawei's HDC module where parameters are not properly verified. Attackers could exploit this t...
Nov 5, 2024Agentgateway versions before 0.12.0 fail to sanitize input path, query, and header values when converting MCP tools/call requests to OpenAPI requests....
Mar 6, 2026Adobe Experience Manager versions 6.5.23.0 and earlier contain an improper input validation vulnerability that allows high-privileged attackers to byp...
Sep 9, 2025An insufficient input validation vulnerability in Absolute Secure Access warehouse component allows attackers with system administrator permissions to...
Jun 12, 2025An improper input validation vulnerability in ZTE GoldenDB allows attackers to manipulate input data, potentially leading to unauthorized data modific...
Mar 11, 2025This SQL injection vulnerability in Cisco SD-WAN vManage allows authenticated attackers to execute malicious SQL queries against the database. It affe...
Nov 15, 2024This vulnerability allows attackers with system administrator permissions to impair the availability of certain elements of the Secure Access administ...
Jun 20, 2024This CVE describes an improper input validation vulnerability in BlueSpice's CognitiveProcessDesigner extension that allows cross-site scripting (XSS)...
Sep 19, 2025A directory traversal vulnerability in ingress-nginx's Admission Controller allows attackers to manipulate filenames to access files outside intended ...
Mar 25, 2025Concrete CMS versions 9.0.0 through 9.3.9 contain a stored cross-site scripting (XSS) vulnerability in the 'Add Folder' functionality. A rogue adminis...
Mar 10, 2025This vulnerability allows high-privilege WordPress users (like administrators) to inject malicious scripts into Text Block options in the Email Subscr...
Jan 13, 2025This PHP vulnerability allows attackers to perform HTTP request smuggling when using streams with proxy configurations and the 'request_fulluri' optio...
Nov 24, 2024This vulnerability in Cisco Finesse's web management interface allows an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS...
Jun 5, 2024This vulnerability in PluXml's Media Management Module allows remote attackers to execute arbitrary code through deserialization of manipulated file a...
Jan 2, 2026This CVE describes a stack-based buffer overflow vulnerability in Redis's redis-check-aof tool, affecting versions 7.0.0 to 8.0.1. It allows an attack...
May 29, 2025A deserialization vulnerability in elunez eladmin's file upload function allows remote attackers to manipulate server arguments. This affects eladmin ...
Mar 27, 2025This vulnerability in b1gMail allows remote attackers to perform deserialization attacks via the query/q parameter in the admin users.php file. It aff...
Feb 27, 2025A remote deserialization vulnerability exists in westboy CicadasCMS 1.0's Template Management component at /system. Attackers can exploit this to exec...
Feb 22, 2025This vulnerability in RuoYi up to version 4.8.0 allows remote attackers to execute arbitrary code through deserialization in the getBeanName function ...
Jan 27, 2025This vulnerability in Docker's RUN --mount instruction allows attackers to bypass input validation and mount arbitrary host directories into container...
Oct 1, 2024An improper input validation vulnerability in Intel PROSet/Wireless WiFi software for Linux allows unauthenticated attackers on the same network to po...
May 16, 2024This vulnerability in Cisco Data Center Network Manager (DCNM) allows authenticated remote attackers to perform path traversal attacks via a specific ...
Nov 18, 2024This vulnerability allows a network-adjacent attacker with administrative access to send specially crafted HTTP requests to the TP-Link Archer BE230 r...
Feb 3, 2026This vulnerability involves improper input validation (CWE-20) that could allow attackers to submit malicious data to affected systems. The specific i...
Nov 17, 2025This vulnerability in Intel CIP software allows unprivileged software combined with a privileged user to potentially disclose information via improper...
Nov 11, 2025This CVE describes an improper input validation vulnerability in Intel VTune Profiler that allows authenticated local users to escalate privileges. At...
Nov 11, 2025This CVE describes a buffer overflow vulnerability in the kernel drop detection module caused by insufficient input validation. Successful exploitatio...
Aug 6, 2025An authenticated attacker with sufficient privileges can create a malformed ACL selector in Redis that triggers a server panic when accessed, causing ...
Jan 6, 2025An improper input validation vulnerability in certain ASUS router models allows attackers to send specially crafted input that crashes the device. Thi...
Dec 4, 2024This vulnerability affects Intel FPGA products with firmware versions before 2.9.1. Improper input validation could allow attackers to cause denial of...
May 16, 2024FreeRDP clients have an out-of-bounds read vulnerability in the RDPGFX channel that allows malicious RDP servers to read uninitialized heap memory. Th...
Feb 25, 2026This vulnerability in TeamViewer DEX Client's Content Distribution Service allows attackers to redirect the service to send data to arbitrary internal...
Dec 11, 2025About Improper Input Validation (CWE-20)
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.
Our database tracks 1,700 CVEs classified as CWE-20, with 344 rated critical and 1,031 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.8.
External reference: View CWE-20 on MITRE CWE →
Monitor Improper Input Validation Vulnerabilities
Get alerted when new Improper Input Validation CVEs affect your infrastructure.
Start Monitoring Free