CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,492
Total CVEs
257
Critical
909
High
7.7
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
145
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 100
2 Google 73
3 Intel 58
4 Qualcomm 44
5 Apache 44
6 Adobe 42
7 Color 40
8 Huawei 39
9 Reolink 36
10 Apple 33

All Improper Input Validation CVEs (1,492)

CVE-2023-49291
9.3

This vulnerability in the tj-actions/branch-names GitHub Action allows attackers to execute arbitrary code by using specially crafted branch names. Th...

Dec 5, 2023
CVE-2023-21671
9.3

This vulnerability allows memory corruption in Qualcomm's Core system during syscall for Sectools Fuse comparison feature. Attackers could potentially...

Nov 7, 2023
CVE-2021-30285
9.3

This vulnerability in Qualcomm Snapdragon hypervisors allows improper memory region validation, potentially enabling attackers to map incorrect memory...

Jan 13, 2022
CVE-2020-15181
9.3

This vulnerability in the Alfresco Reset Password add-on allows attackers to gain administrative access by exploiting untrusted input validation flaws...

Sep 18, 2020
CVE-2026-25722
9.1

CVE-2026-25722 is a directory traversal vulnerability in Claude Code that allows attackers to bypass write protection in sensitive directories like .c...

Feb 6, 2026
CVE-2025-61546
9.1

This vulnerability in Print Shop Pro WebDesk allows remote attackers to purchase items with negative quantities, creating financial discrepancies by m...

Jan 8, 2026
CVE-2025-69288
9.1

This vulnerability allows any authenticated admin user in Titra time tracking software to execute arbitrary code on the server by manipulating timeEnt...

Dec 31, 2025
CVE-2025-68398
9.1

This vulnerability in Weblate allows remote attackers to overwrite Git configuration settings, potentially altering Git behavior and enabling further ...

Dec 18, 2025
CVE-2025-61809
9.1

This CVE describes an Improper Input Validation vulnerability in Adobe ColdFusion that allows attackers to bypass security measures and gain unauthori...

Dec 10, 2025
CVE-2025-61235
9.1

CVE-2025-61235 is an authentication bypass vulnerability in Dataphone A920 devices where specially crafted packets with arbitrary data are accepted wi...

Oct 28, 2025
CVE-2025-57644
9.1

Accela Automation Platform 22.2.3.0.230103 contains multiple vulnerabilities in its Test Script feature that allow authenticated administrative users ...

Sep 19, 2025
CVE-2025-54236
KEV EPSS 69.2% 9.1

CVE-2025-54236 is an improper input validation vulnerability in Adobe Commerce (Magento) that allows unauthenticated attackers to achieve session take...

Sep 9, 2025
CVE-2025-9287
9.1

CVE-2025-9287 is an improper input validation vulnerability in the cipher-base npm package that allows attackers to manipulate input data during crypt...

Aug 20, 2025
CVE-2025-9060
9.1

This vulnerability in MSoft MFlash allows authenticated administrators to execute arbitrary code on the server due to insufficient parameter validatio...

Aug 15, 2025
CVE-2025-40746
9.1

This vulnerability in SIMATIC RTLS Locating Manager allows authenticated remote attackers with high application privileges to execute arbitrary code w...

Aug 12, 2025
CVE-2025-31281
9.1

This CVE describes an input validation vulnerability in Apple operating systems that allows maliciously crafted files to cause unexpected app terminat...

Jul 30, 2025
CVE-2025-43559
9.1

This CVE describes an improper input validation vulnerability in Adobe ColdFusion that allows authenticated high-privileged attackers to execute arbit...

May 13, 2025
CVE-2025-27494
9.1

This vulnerability allows authenticated remote administrators on SiPass integrated access control systems to escalate privileges by injecting arbitrar...

Mar 11, 2025
CVE-2024-48914
9.1

This vulnerability in Vendure's asset server plugin allows attackers to perform directory traversal attacks, enabling them to read arbitrary files on ...

Oct 15, 2024
CVE-2024-41940
9.1

This vulnerability in SINEC NMS allows authenticated attackers to execute arbitrary operating system commands with elevated privileges by exploiting i...

Aug 13, 2024
CVE-2024-32755
9.1

CVE-2024-32755 is an input validation vulnerability in Johnson Controls Metasys web interface that allows attackers to submit unexpected characters, p...

Jul 2, 2024
CVE-2024-34108
9.1

This CVE describes an Improper Input Validation vulnerability in Adobe Commerce that allows authenticated users with admin privileges to execute arbit...

Jun 13, 2024
CVE-2024-22120
9.1

CVE-2024-22120 is a SQL injection vulnerability in Zabbix server's audit logging functionality. Attackers can inject malicious SQL through the unsanit...

May 17, 2024
CVE-2024-25641
9.1

CVE-2024-25641 is an arbitrary file write vulnerability in Cacti's Package Import feature that allows authenticated users with 'Import Templates' perm...

May 14, 2024
CVE-2024-2443
9.1

A command injection vulnerability in GitHub Enterprise Server allows attackers with editor role access to the Management Console to execute arbitrary ...

Mar 20, 2024
CVE-2024-1369
9.1

A command injection vulnerability in GitHub Enterprise Server allows attackers with editor role access to the Management Console to gain admin SSH acc...

Feb 13, 2024
CVE-2024-1374
9.1

A command injection vulnerability in GitHub Enterprise Server allows authenticated users with editor role in the Management Console to execute arbitra...

Feb 13, 2024
CVE-2024-1355
9.1

A command injection vulnerability in GitHub Enterprise Server allows attackers with editor role access to the Management Console to execute arbitrary ...

Feb 13, 2024
CVE-2024-0057
9.1

This vulnerability allows attackers to bypass security features in .NET, .NET Framework, and Visual Studio, potentially enabling unauthorized access o...

Jan 9, 2024
CVE-2023-48310
9.1

TestingPlatform versions before 2.1.1 have improper input validation that allows attackers to pass arbitrary nmap options and CIDR blocks. This enable...

Nov 20, 2023
CVE-2023-5832
9.1

CVE-2023-5832 is an improper input validation vulnerability in the Anything-LLM software that allows attackers to execute arbitrary code or cause deni...

Oct 30, 2023
CVE-2023-38701
9.1

This vulnerability in Hydra (Cardano's layer-2 scalability solution) allows attackers to steal funds that users are trying to commit to Hydra heads an...

Oct 4, 2023
CVE-2022-24093
9.1

CVE-2022-24093 is an improper input validation vulnerability in Adobe Commerce (formerly Magento) that allows authenticated attackers to execute arbit...

Sep 12, 2023
CVE-2023-3724
9.1

This vulnerability in wolfSSL's TLS 1.3 implementation allows an attacker to compromise TLS session encryption when a client connects to a malicious s...

Jul 17, 2023
CVE-2021-46754
9.1

This vulnerability in AMD's Secure Processor bootloader allows attackers with compromised Uapp or ABL components to force the bootloader to leak sensi...

May 9, 2023
CVE-2021-46756
9.1

This vulnerability in AMD Secure Processor bootloader allows attackers with malicious user applications or ABL to send malformed syscalls, potentially...

May 9, 2023
CVE-2022-46836
9.1

This CVE describes a PHP code injection vulnerability in Checkmk's watolib auth.php and hosttags.php components. Attackers can inject and execute arbi...

Feb 20, 2023
CVE-2022-29897
9.1

This vulnerability allows authenticated admin users on PHOENIX CONTACT RAD-ISM-900-EN devices to execute arbitrary code with root privileges via the t...

May 11, 2022
CVE-2022-1053
9.1

This vulnerability in Keylime allows an attacker to bypass TPM-based hardware attestation by using mismatched attestation key (AK) and endorsement key...

May 6, 2022
CVE-2021-41945
9.1

CVE-2021-41945 is an improper input validation vulnerability in the httpx Python library that allows attackers to manipulate URL parsing to bypass sec...

Apr 28, 2022
CVE-2022-0567
9.1

This vulnerability in ovn-kubernetes allows administrators or privileged attackers to create egress network policies that bypass existing ingress poli...

Apr 20, 2022
CVE-2022-24846
9.1

This vulnerability in GeoWebCache allows arbitrary code execution via an unchecked JNDI lookup in the disk quota mechanism. Attackers with admin-level...

Apr 14, 2022
CVE-2021-42853
9.1

This directory traversal vulnerability in SteelCentral AppInternals Dynamic Sampling Agent allows attackers to read or delete arbitrary files on the s...

Mar 10, 2022
CVE-2021-37116
9.1

CVE-2021-37116 is a design weakness vulnerability in PCManager that allows attackers to change subscriber PINs without proper authorization. This affe...

Jan 3, 2022
CVE-2021-36025
9.1

CVE-2021-36025 is an improper input validation vulnerability in Adobe Magento Commerce that allows authenticated attackers with admin privileges to up...

Sep 1, 2021
CVE-2020-11144
9.1

This vulnerability allows attackers to cause a buffer over-read while processing invalid DL ROHC packets for decompression in Qualcomm Snapdragon chip...

Jan 21, 2021
CVE-2020-9139
9.1

This vulnerability in certain Huawei smartphones allows attackers to trigger memory access errors and denial of service through improper input validat...

Jan 13, 2021
CVE-2018-19945
9.1

This vulnerability allows attackers to rename arbitrary files on affected QNAP devices due to improper pathname restrictions. It affects QNAP devices ...

Dec 31, 2020
CVE-2018-15632
9.1

This vulnerability allows remote attackers to create empty databases in Odoo Community and Enterprise versions 11.0 and earlier. Attackers can then co...

Dec 22, 2020
CVE-2020-9906
9.1

This CVE describes a memory corruption vulnerability in Apple's kernel that allows remote attackers to cause system crashes or corrupt kernel memory. ...

Oct 22, 2020

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,492 CVEs classified as CWE-20, with 257 rated critical and 909 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free