CWE-20: Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

1,511
Total CVEs
263
Critical
922
High
7.7
Avg CVSS
5
In CISA KEV

Yearly Trend

2026
145
2025
427
2024
314
2023
243
2022
143

Top Affected Vendors

1 Microsoft 104
2 Google 75
3 Intel 58
4 Qualcomm 44
5 Apache 44
6 Adobe 42
7 Cisco 41
8 Huawei 40
9 Color 40
10 Reolink 36

All Improper Input Validation CVEs (1,511)

CVE-2023-3768
8.6

This vulnerability allows attackers on the same network to send specially crafted MMS protocol packets that cause a denial-of-service condition, forci...

Oct 2, 2023
CVE-2023-33964
8.6

A vulnerability in mx-chain-go (MultiversX blockchain implementation) allows invalid cross-shard transactions with incorrect usernames to cause the me...

May 31, 2023
CVE-2022-4904
8.6

CVE-2022-4904 is a stack buffer overflow vulnerability in the c-ares DNS library's ares_set_sortlist function. Attackers can trigger denial of service...

Mar 6, 2023
CVE-2022-25161
8.6

This vulnerability allows remote unauthenticated attackers to cause a denial-of-service condition in affected Mitsubishi Electric MELSEC iQ-F series P...

May 18, 2022
CVE-2022-20745
8.6

An unauthenticated remote attacker can cause a denial of service (DoS) by sending a crafted HTTPS request to Cisco ASA or FTD devices with web service...

May 3, 2022
CVE-2021-33012
8.6

CVE-2021-33012 allows remote, unauthenticated attackers to send specially crafted commands that cause Rockwell Automation MicroLogix 1100 PLCs to faul...

Jul 9, 2021
CVE-2025-52451
8.5

An improper input validation vulnerability in Salesforce Tableau Server allows attackers to perform absolute path traversal through the tabdoc API's c...

Aug 22, 2025
CVE-2024-50386
8.5

This vulnerability in Apache CloudStack allows attackers who can register templates to deploy malicious instances on KVM-based environments, potential...

Nov 12, 2024
CVE-2024-45219
8.5

Apache CloudStack has a vulnerability where users can upload malicious KVM-compatible templates or volumes that bypass validation checks. This allows ...

Oct 16, 2024
CVE-2023-30690
8.5

This vulnerability allows local attackers to execute privileged activities on Samsung devices due to improper input validation in the Duo component. I...

Oct 4, 2023
CVE-2023-30664
8.5

This vulnerability allows local attackers to bypass input validation in Samsung's RegisteredMSISDN component, enabling them to execute privileged acti...

Jul 6, 2023
CVE-2023-30655
8.5

This vulnerability allows local attackers to bypass input validation in SCEPProfile on Samsung devices, enabling them to execute privileged activities...

Jul 6, 2023
CVE-2023-30658
8.5

This vulnerability allows local attackers to bypass security restrictions and execute privileged activities on Samsung devices due to improper input v...

Jul 6, 2023
CVE-2023-21439
8.5

This vulnerability allows attackers to launch unauthorized activities on Samsung devices due to improper input validation in the UwbDataTxStatusEvent ...

Feb 9, 2023
CVE-2022-33703
8.5

This vulnerability in Samsung's CACertificateInfo component allows attackers to bypass certificate validation, potentially enabling malicious activiti...

Jul 12, 2022
CVE-2022-30712
8.5

This vulnerability in Samsung's KfaOptions component allows attackers to launch unauthorized activities due to improper input validation. It affects S...

Jun 7, 2022
CVE-2022-30710
8.5

This vulnerability in Samsung's RemoteViews component allows attackers to launch unauthorized activities on affected devices due to improper input val...

Jun 7, 2022
CVE-2022-27826
8.5

This vulnerability in Samsung's SemSuspendDialogInfo component allows attackers to bypass validation checks and launch unauthorized activities on affe...

Apr 11, 2022
CVE-2022-27828
8.5

This vulnerability in Samsung's MediaMonitorEvent component allows attackers to launch unauthorized activities due to improper input validation. It af...

Apr 11, 2022
CVE-2022-27830
8.5

This vulnerability in Samsung's SemBlurInfo component allows attackers to launch unauthorized activities on affected devices due to improper input val...

Apr 11, 2022
CVE-2021-35223
8.5

CVE-2021-35223 is a remote code execution vulnerability in SolarWinds Serv-U File Server where user-supplied parameters in audit command execution can...

Aug 31, 2021
CVE-2025-61812
8.4

This CVE describes an improper input validation vulnerability in Adobe ColdFusion that allows high-privileged attackers to execute arbitrary code with...

Dec 10, 2025
CVE-2025-24255
8.4

This macOS vulnerability allows applications to escape their sandbox restrictions due to improper input validation. It affects macOS Ventura, Sequoia,...

Mar 31, 2025
CVE-2024-58044
8.4

This CVE describes a permission verification bypass vulnerability in Huawei's notification module that allows attackers to bypass intended access cont...

Mar 4, 2025
CVE-2024-56134
8.4

This CVE-2024-56134 is an OS command injection vulnerability in Progress LoadMaster that allows authenticated users to execute arbitrary operating sys...

Feb 5, 2025
CVE-2024-56135
8.4

This CVE-2024-56135 is an authenticated OS command injection vulnerability in Progress LoadMaster that allows authenticated users to execute arbitrary...

Feb 5, 2025
CVE-2024-56131
8.4

An authenticated user can execute arbitrary operating system commands on Progress LoadMaster due to improper input validation. This affects LoadMaster...

Feb 5, 2025
CVE-2024-56132
8.4

This CVE-2024-56132 is an OS command injection vulnerability in Progress LoadMaster that allows authenticated users to execute arbitrary commands on t...

Feb 5, 2025
CVE-2024-56133
8.4

This CVE-2024-56133 is an authenticated OS command injection vulnerability in Progress LoadMaster load balancers. It allows authenticated users to exe...

Feb 5, 2025
CVE-2024-33065
8.4

This vulnerability allows memory corruption in Qualcomm camera drivers when taking snapshots with specific offset variables. Attackers could potential...

Oct 7, 2024
CVE-2024-31959
8.4

This vulnerability in Samsung Exynos processors allows attackers to execute arbitrary code by exploiting improper validation of native handles. It aff...

Jun 7, 2024
CVE-2023-28291
8.4

CVE-2023-28291 is a remote code execution vulnerability in Microsoft's Raw Image Extension that allows attackers to execute arbitrary code by tricking...

Apr 11, 2023
CVE-2021-0066
8.4

This vulnerability allows an unauthenticated attacker with local access to a system to escalate privileges by exploiting improper input validation in ...

Feb 9, 2022
CVE-2021-30305
8.4

This vulnerability in Qualcomm Snapdragon chipsets allows potential out-of-bounds memory access due to insufficient validation of page offsets before ...

Oct 20, 2021
CVE-2021-30261
8.4

This vulnerability allows attackers to trigger integer and heap overflows by sending specially crafted beacon template update commands to affected Qua...

Sep 17, 2021
CVE-2020-11237
8.4

CVE-2020-11237 is a memory corruption vulnerability in Qualcomm Snapdragon chipsets where lack of validation of histogram definition data before acces...

Apr 7, 2021
CVE-2023-25533
8.3

This vulnerability in NVIDIA DGX H100 BMC's web UI allows improper input validation, potentially enabling attackers to execute arbitrary code, escalat...

Sep 20, 2023
CVE-2023-3466
8.3

CVE-2023-3466 is a reflected cross-site scripting (XSS) vulnerability in Citrix ADC and Citrix Gateway that allows attackers to inject malicious scrip...

Jul 19, 2023
CVE-2021-23853
8.3

This vulnerability in Bosch IP cameras allows attackers to inject arbitrary HTTP headers through specially crafted URLs due to improper input validati...

Jun 9, 2021
CVE-2025-53652
8.2

The Jenkins Git Parameter Plugin vulnerability allows attackers with Item/Build permission to inject arbitrary values into Git parameters by bypassing...

Jul 9, 2025
CVE-2025-27493
8.2

This vulnerability allows authenticated local administrators on SiPass integrated access control systems to escalate privileges by injecting arbitrary...

Mar 11, 2025
CVE-2023-43758
8.2

This UEFI firmware vulnerability in certain Intel processors allows privileged users to escalate privileges through improper input validation. Attacke...

Feb 12, 2025
CVE-2024-0179
8.2

This vulnerability allows locally authenticated attackers to exploit a System Management Mode (SMM) callout in AMD's CPM Display Feature driver to ove...

Feb 11, 2025
CVE-2025-1022
8.2

This vulnerability in spatie/browsershot allows attackers to bypass file URI scheme validation by omitting slashes in file paths, potentially enabling...

Feb 5, 2025
CVE-2024-36482
8.2

This vulnerability in Intel CIP software allows a privileged user with local access to potentially escalate privileges through improper input validati...

Nov 13, 2024
CVE-2024-36282
8.2

This vulnerability allows a privileged user with local access to Intel Server Board S2600ST systems to potentially escalate privileges through imprope...

Nov 13, 2024
CVE-2024-38216
8.2

This vulnerability allows authenticated users on Azure Stack Hub to elevate their privileges beyond their assigned permissions. It affects organizatio...

Sep 10, 2024
CVE-2024-28947
8.2

This vulnerability allows a privileged user with local access to exploit improper input validation in Intel Server Board S2600ST Family firmware kerne...

Aug 14, 2024
CVE-2024-35296
8.2

Apache Traffic Server versions 8.0.0-8.1.10 and 9.0.0-9.2.4 have a vulnerability where specially crafted Accept-Encoding headers can bypass cache look...

Jul 26, 2024
CVE-2024-22271
8.2

Spring Cloud Function framework versions 4.0.0-4.0.7 and 4.1.0-4.1.1 are vulnerable to denial-of-service attacks when using the Web module. Attackers ...

Jul 9, 2024

About Improper Input Validation (CWE-20)

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties required to process the data safely.

Our database tracks 1,511 CVEs classified as CWE-20, with 263 rated critical and 922 rated high severity. The average CVSS score for Improper Input Validation vulnerabilities is 7.7.

External reference: View CWE-20 on MITRE CWE →

Monitor Improper Input Validation Vulnerabilities

Get alerted when new Improper Input Validation CVEs affect your infrastructure.

Start Monitoring Free