CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,706
Total CVEs
345
Critical
1,036
High
7.8
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
150
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 107
2 Google 92
3 Cisco 74
4 Intel 67
5 Qualcomm 49
6 Apache 47
7 Huawei 43
8 Adobe 42
9 Apple 41
10 Color 40

All Improper Input Validation CVEs (1,706)

CVE-2025-54636
4.4

This CVE describes a buffer overflow vulnerability in the kernel drop detection module caused by insufficient input validation. Successful exploitatio...

Aug 6, 2025
CVE-2024-51741
4.4

An authenticated attacker with sufficient privileges can create a malformed ACL selector in Redis that triggers a server panic when accessed, causing ...

Jan 6, 2025
CVE-2024-11985
4.4

An improper input validation vulnerability in certain ASUS router models allows attackers to send specially crafted input that crashes the device. Thi...

Dec 4, 2024
CVE-2024-22390
4.4

This vulnerability affects Intel FPGA products with firmware versions before 2.9.1. Improper input validation could allow attackers to cause denial of...

May 16, 2024
CVE-2026-25941
4.3

FreeRDP clients have an out-of-bounds read vulnerability in the RDPGFX channel that allows malicious RDP servers to read uninitialized heap memory. Th...

Feb 25, 2026
CVE-2025-46266
4.3

This vulnerability in TeamViewer DEX Client's Content Distribution Service allows attackers to redirect the service to send data to arbitrary internal...

Dec 11, 2025
CVE-2025-40935
4.3

This vulnerability affects multiple Siemens RUGGEDCOM industrial networking devices running firmware versions below V5.10.1. An authenticated remote a...

Dec 9, 2025
CVE-2025-20389
4.3

A low-privileged user without admin or power roles can craft a malicious payload in the label column field when adding a new device in the Splunk Secu...

Dec 3, 2025
CVE-2025-64515
4.3

Open Forms versions before 3.2.7 and 3.3.3 contain an input validation vulnerability where form fields marked as readonly or disabled on the client si...

Nov 18, 2025
CVE-2025-11497
4.3

This CSRF vulnerability in the Advanced Database Cleaner WordPress plugin allows unauthenticated attackers to trick administrators into changing plugi...

Oct 25, 2025
CVE-2025-61583
4.3

A reflected cross-site scripting (XSS) vulnerability in TS3 Manager versions 2.2.1 and earlier allows attackers to inject malicious scripts via server...

Oct 1, 2025
CVE-2025-8662
4.3

OpenAM contains a vulnerability where tampered SAML requests can cause the Identity Provider (IdP) to malfunction. This affects OpenAM Consortium Edit...

Sep 2, 2025
CVE-2025-52620
4.3

HCL BigFix SaaS Authentication Service contains a Cross-Site Scripting vulnerability in its image upload functionality. Attackers can upload malicious...

Aug 15, 2025
CVE-2025-55006
4.3

Frappe Learning versions 2.33.0 and below have an SVG upload vulnerability that allows attackers to upload malicious SVG files containing embedded Jav...

Aug 9, 2025
CVE-2025-8582
4.3

This vulnerability allows attackers to spoof the URL bar (Omnibox) content in Google Chrome by tricking users into visiting malicious websites. It aff...

Aug 7, 2025
CVE-2025-24785
4.3

This vulnerability in iTop 3.2.0 allows attackers to send specially crafted URLs that trigger PHP errors, causing the dashboard to crash for subsequen...

May 14, 2025
CVE-2025-4260
4.3

This vulnerability in Youkefu up to version 4.2.0 allows remote attackers to execute arbitrary code through insecure deserialization in the TemplateCo...

May 5, 2025
CVE-2025-26477
4.3

Dell ECS versions 3.8.1.4 and earlier contain an improper input validation vulnerability that allows low-privileged remote attackers to execute arbitr...

Apr 17, 2025
CVE-2025-29150
4.3

BlueCMS 1.6 contains an arbitrary file deletion vulnerability that allows attackers to delete files on the server via a crafted request to /publish.ph...

Apr 10, 2025
CVE-2024-6254
4.3

The Brizy Page Builder WordPress plugin has a CSRF vulnerability that allows attackers to trick administrators into submitting malicious forms. This a...

Aug 8, 2024
CVE-2024-7005
4.3

This vulnerability in Google Chrome's Safe Browsing feature allows attackers to bypass discretionary access controls by tricking users into performing...

Aug 6, 2024
CVE-2023-38417
4.3

This vulnerability in Intel PROSet/Wireless WiFi software allows unauthenticated attackers on the same network to potentially cause denial of service ...

May 16, 2024
CVE-2025-11958
4.1

An improper input validation vulnerability in Devolutions Server's Security Dashboard ignored-tasks API allows authenticated users to send crafted req...

Oct 22, 2025
CVE-2025-7060
4.1

Monitorr versions up to 1.7.6m contain an improper input validation vulnerability in the installer component. Attackers can remotely manipulate the 'd...

Jul 4, 2025
CVE-2025-20009
4.1

This vulnerability allows a privileged user with local access to potentially enable information disclosure through improper input validation in the UE...

May 13, 2025
CVE-2025-46574
4.1

An information disclosure vulnerability in GoldenDB database allows attackers to extract sensitive system information through error messages. Organiza...

Apr 27, 2025
CVE-2025-59301
4.0

Delta Electronics DVP15MC11T programmable logic controllers lack proper validation of Modbus/TCP packets, allowing specially crafted packets to cause ...

Dec 22, 2025
CVE-2025-30509
3.8

This vulnerability in Intel QuickAssist Technology software allows authenticated local users to escalate privileges through improper input validation....

Nov 11, 2025
CVE-2026-2391
3.7

This vulnerability in the qs library allows attackers to bypass array size limits when comma-separated parsing is enabled, creating arbitrarily large ...

Feb 12, 2026
CVE-2026-0976
3.7

This vulnerability allows attackers to bypass reverse proxy path filtering by using RFC-compliant matrix parameters in URLs. Keycloak deployments behi...

Jan 15, 2026
CVE-2026-22611
3.7

The AWS SDK for .NET vulnerability allows attackers with environment access to redirect AWS API calls to non-AWS hosts by setting invalid region value...

Jan 10, 2026
CVE-2025-15284
3.7

This vulnerability allows attackers to bypass array size limits in the qs parsing library, enabling denial-of-service attacks via memory exhaustion. A...

Dec 29, 2025
CVE-2025-13805
3.7

This vulnerability in NutzBoot's LiteRpc-Serializer component allows remote attackers to execute arbitrary code through deserialization attacks. It af...

Dec 1, 2025
CVE-2025-48985
3.7

This vulnerability in Vercel's AI SDK allows users to bypass filetype whitelists when uploading files, potentially enabling malicious file uploads. It...

Nov 7, 2025
CVE-2025-43533
3.5

This vulnerability involves memory corruption issues in Apple's operating systems that could allow a malicious HID (Human Interface Device) to cause u...

Dec 17, 2025
CVE-2025-31948
3.3

An improper input validation vulnerability in Intel oneAPI Math Kernel Library versions before 2025.2 allows local authenticated users to cause denial...

Nov 11, 2025
CVE-2025-25216
3.3

An improper input validation vulnerability in certain Intel Graphics Drivers and Intel LTS kernels allows unprivileged local users to cause denial of ...

Nov 11, 2025
CVE-2025-15117
3.1

This vulnerability in Dromara Sa-Token allows remote attackers to execute arbitrary code through insecure deserialization in the SaJdkSerializer compo...

Dec 28, 2025
CVE-2025-43365
2.8

An unprivileged process can terminate root processes on iOS and iPadOS devices due to improper input validation, causing denial-of-service. This affec...

Nov 4, 2025
CVE-2026-26063
N/A

CediPay versions before 1.2.3 contain an input validation bypass vulnerability in the transaction API. Attackers can exploit this to submit malformed ...

Feb 19, 2026
CVE-2026-24734
N/A

This vulnerability in Apache Tomcat Native and Apache Tomcat allows attackers to bypass certificate revocation checks when using OCSP responders. Impr...

Feb 17, 2026
CVE-2025-66614
N/A

This vulnerability allows attackers to bypass client certificate authentication in Apache Tomcat when multiple virtual hosts are configured with diffe...

Feb 17, 2026
CVE-2025-67480
N/A

This vulnerability in MediaWiki's API query revisions base component could allow attackers to access or manipulate revision data improperly. It affect...

Feb 3, 2026
CVE-2025-67484
N/A

This vulnerability in MediaWiki's XML API formatting component could allow attackers to execute unauthorized actions or access sensitive data. It affe...

Feb 3, 2026
CVE-2025-61652
N/A

This vulnerability in Wikimedia Foundation DiscussionTools allows attackers to execute unauthorized actions or access restricted functionality. It aff...

Feb 3, 2026
CVE-2026-25117
N/A

This CVE describes a sandbox escape vulnerability in pwn.college DOJO education platform where challenge authors could inject arbitrary JavaScript tha...

Jan 29, 2026
CVE-2025-59895
N/A

Sync Breeze Enterprise Server and Disk Pulse Enterprise v10.4.18 contain a remote denial-of-service vulnerability in their configuration restore funct...

Jan 28, 2026
CVE-2026-22598
N/A

A vulnerability in ManageIQ's API allows attackers to create malformed TimeProfile objects that cause subsequent UI and API requests to timeout, resul...

Jan 21, 2026
CVE-2025-68667
N/A

This vulnerability allows remote unauthenticated attackers to forge membership events on vulnerable Matrix homeservers, enabling them to forcibly remo...

Dec 23, 2025
CVE-2025-2296
N/A

CVE-2025-2296 is an improper input validation vulnerability in EDK2 BIOS/UEFI firmware that allows local attackers to manipulate control flow. This co...

Dec 9, 2025

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,706 CVEs classified as CWE-20, with 345 rated critical and 1,036 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.8.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free