CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,505
Total CVEs
259
Critical
920
High
7.7
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
145
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 100
2 Google 75
3 Intel 58
4 Qualcomm 44
5 Apache 44
6 Adobe 42
7 Cisco 41
8 Color 40
9 Huawei 39
10 Reolink 36

All Improper Input Validation CVEs (1,505)

CVE-2025-24514
EPSS 30.5% 8.8

This vulnerability allows attackers to inject malicious configuration into ingress-nginx via the auth-url annotation, leading to arbitrary code execut...

Mar 25, 2025
CVE-2025-1098
EPSS 53.9% 8.8

This vulnerability in ingress-nginx allows attackers to inject arbitrary nginx configuration via the 'mirror-target' and 'mirror-host' annotations, po...

Mar 25, 2025
CVE-2025-1097
EPSS 20.8% 8.8

CVE-2025-1097 is a critical vulnerability in ingress-nginx where the auth-tls-match-cn annotation can be exploited to inject malicious configuration i...

Mar 25, 2025
CVE-2024-33659
8.8

This vulnerability in AMI APTIOV BIOS allows a local attacker to exploit improper input validation, potentially leading to arbitrary memory overwrites...

Feb 11, 2025
CVE-2024-38420
8.8

This vulnerability allows memory corruption when configuring a hypervisor-based input virtual device, potentially enabling arbitrary code execution or...

Feb 3, 2025
CVE-2024-21974
8.8

This vulnerability in AMD's NPU driver allows attackers to execute arbitrary code by exploiting improper input validation. It affects systems with vul...

Nov 12, 2024
CVE-2024-21976
8.8

This vulnerability in AMD's NPU driver allows attackers to execute arbitrary code by exploiting improper input validation. It affects systems with AMD...

Nov 12, 2024
CVE-2024-43611
8.8

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Routing and Remote Access Service (RRAS) by sending sp...

Oct 8, 2024
CVE-2024-43593
8.8

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Routing and Remote Access Service (RRAS) by sending sp...

Oct 8, 2024
CVE-2024-38265
8.8

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Routing and Remote Access Service (RRAS) by sending sp...

Oct 8, 2024
CVE-2024-7023
8.8

This vulnerability in Google Chrome's updater allows remote attackers to escalate privileges by tricking users into opening malicious files. It affect...

Sep 23, 2024
CVE-2024-43455
8.8

This vulnerability allows attackers to spoof the Windows Remote Desktop Licensing Service, potentially enabling them to intercept or manipulate licens...

Sep 10, 2024
CVE-2024-37965
8.8

This CVE describes an elevation of privilege vulnerability in Microsoft SQL Server where an authenticated attacker could execute arbitrary code with e...

Sep 10, 2024
CVE-2024-38811
8.8

CVE-2024-38811 is a code execution vulnerability in VMware Fusion where attackers with standard user privileges can exploit an insecure environment va...

Sep 3, 2024
CVE-2024-7646
8.8

This vulnerability allows attackers with permission to create Ingress objects to bypass annotation validation and execute arbitrary commands, potentia...

Aug 16, 2024
CVE-2024-40720
8.8

This vulnerability in TCBServiSign Windows software allows unauthenticated remote attackers to execute arbitrary commands on affected systems. Attacke...

Aug 2, 2024
CVE-2024-3172
8.8

This vulnerability in Google Chrome DevTools allows remote attackers to execute arbitrary code by tricking users into performing specific UI gestures ...

Jul 16, 2024
CVE-2024-40518
8.8

SeaCMS 12.9 contains a remote code execution vulnerability in admin_weixin.php where unvalidated user input is directly written to weixin.php. Authent...

Jul 12, 2024
CVE-2024-40520
8.8

SeaCMS 12.9 has a remote code execution vulnerability in admin_config_mark.php that allows authenticated attackers to inject arbitrary code into inc_p...

Jul 12, 2024
CVE-2024-38021
8.8

This vulnerability allows remote code execution on systems running vulnerable versions of Microsoft Outlook. An attacker could exploit this by sending...

Jul 9, 2024
CVE-2024-30040
8.8

CVE-2024-30040 is a security feature bypass vulnerability in the Windows MSHTML platform that could allow an attacker to circumvent security protectio...

May 14, 2024
CVE-2024-2746
8.8

CVE-2024-2746 is an incomplete fix for CVE-2024-1929 in dnf5's D-Bus daemon that allows local unprivileged users to pass arbitrary configuration param...

May 8, 2024
CVE-2024-28976
8.8

Dell Repository Manager versions before 3.4.5 contain a path traversal vulnerability in the API module. A local attacker with low privileges can explo...

Apr 24, 2024
CVE-2024-26164
8.8

This vulnerability in Microsoft's Django Backend for SQL Server allows remote attackers to execute arbitrary code on affected systems. It affects appl...

Mar 12, 2024
CVE-2024-21625
8.8

CVE-2024-21625 is a remote code execution vulnerability in SideQuest desktop application where malicious deep links (sidequest://) can execute arbitra...

Jan 4, 2024
CVE-2023-49299
8.8

This vulnerability allows authenticated users in Apache DolphinScheduler to execute arbitrary JavaScript code on the server without sandbox restrictio...

Dec 30, 2023
CVE-2023-47804
8.8

Apache OpenOffice documents can contain malicious links that execute internal macros with arbitrary arguments without user approval. This allows arbit...

Dec 29, 2023
CVE-2023-47107
8.8

CVE-2023-47107 is a host header injection vulnerability in PILOS that allows attackers to manipulate password reset URLs to point to malicious servers...

Nov 8, 2023
CVE-2023-39913
8.8

This vulnerability in Apache UIMA Java SDK allows arbitrary code execution through deserialization of untrusted data. Attackers can exploit it by send...

Nov 8, 2023
CVE-2023-3893
8.8

This vulnerability allows users with pod creation permissions on Windows nodes running kubernetes-csi-proxy to escalate privileges to admin/root level...

Nov 3, 2023
CVE-2023-3676
8.8

This vulnerability allows authenticated users who can create pods on Windows nodes in Kubernetes clusters to escalate privileges to administrator leve...

Oct 31, 2023
CVE-2022-4886
8.8

This vulnerability allows attackers to bypass path sanitization in ingress-nginx by using the log_format directive, potentially enabling path traversa...

Oct 25, 2023
CVE-2023-39357
8.8

CVE-2023-39357 is a SQL injection vulnerability in Cacti's sql_save function that allows authenticated users to execute arbitrary SQL commands. This c...

Sep 5, 2023
CVE-2023-40798
8.8

This vulnerability in Tenda AC23 routers allows authenticated attackers to execute arbitrary code via stack overflow in IPv6 and WAN parameter functio...

Aug 25, 2023
CVE-2023-40801
8.8

CVE-2023-40801 is a stack overflow vulnerability in Tenda AC23 routers caused by improper input validation in the sub_451784 function. Attackers can e...

Aug 25, 2023
CVE-2023-4357
8.8

This vulnerability in Google Chrome allows attackers to bypass file access restrictions through malicious XML input in crafted HTML pages. It affects ...

Aug 15, 2023
CVE-2023-1888
8.8

The Directorist WordPress plugin up to version 7.5.4 contains an authentication bypass vulnerability that allows authenticated attackers with subscrib...

Jun 9, 2023
CVE-2021-46773
8.8

This vulnerability in AMD's ABL (AGESA Boot Loader) allows a privileged attacker to corrupt ASP (AMD Secure Processor) memory through insufficient inp...

May 9, 2023
CVE-2021-46769
8.8

This vulnerability allows a privileged attacker to bypass syscall input validation in AMD's ASP Bootloader, enabling arbitrary DMA copies that can lea...

May 9, 2023
CVE-2023-0896
8.8

Lenovo Smart Clock Essential with Alexa Built In devices have a default password vulnerability that allows attackers on the same local network to gain...

May 1, 2023
CVE-2022-47192
8.8

CVE-2022-47192 allows remote attackers to upload a modified backup file containing a manipulated 'users.json' to Generex UPS CS141 web servers. This e...

Mar 31, 2023
CVE-2022-45725
8.8

This vulnerability allows remote attackers on the same network to execute arbitrary code on Comfast CF-WR6110N routers via HTTP POST requests due to i...

Feb 13, 2023
CVE-2022-32534
8.8

This vulnerability allows remote attackers to execute arbitrary shell commands on Bosch Ethernet switch PRA-ES8P2S devices through command injection i...

Jun 23, 2022
CVE-2022-1727
8.8

CVE-2022-1727 is an improper input validation vulnerability in draw.io diagramming software that allows attackers to execute arbitrary code by trickin...

May 18, 2022
CVE-2022-26781
8.8

This vulnerability allows remote attackers to execute arbitrary code on InHand Networks InRouter302 devices by exploiting improper input validation in...

May 12, 2022
CVE-2022-26889
8.8

This path traversal vulnerability in Splunk Enterprise allows attackers to inject arbitrary content into web pages or bypass SPL command safeguards. I...

May 6, 2022
CVE-2022-24299
8.8

This vulnerability allows authenticated attackers with OpenVPN configuration privileges to execute arbitrary commands on pfSense firewalls due to impr...

Mar 31, 2022
CVE-2021-33115
8.8

This vulnerability in Intel PROSet/Wireless WiFi UEFI firmware allows an unauthenticated attacker on the same network to potentially escalate privileg...

Feb 9, 2022
CVE-2021-0162
8.8

This vulnerability in Intel PROSet/Wireless and Killer Wi-Fi software allows an unauthenticated attacker on the same network to potentially escalate p...

Feb 9, 2022
CVE-2022-22727
8.8

This vulnerability in EcoStruxure Power Monitoring Expert allows unauthenticated attackers to exploit improper input validation. Attackers can view da...

Feb 4, 2022

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,505 CVEs classified as CWE-20, with 259 rated critical and 920 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free