CWE-59: CWE-59

279
Total CVEs
13
Critical
198
High
7.4
Avg CVSS
1
In CISA KEV

Yearly Trend

2026
30
2025
90
2024
70
2023
40
2022
20

Top Affected Vendors

1 Microsoft 72
2 Apple 23
3 Trendmicro 13
4 Dell 6
5 Canonical 6
6 Google 4
7 Avast 4
8 Malwarebytes 4
9 Tanium 3
10 Qnap 3

All CWE-59 CVEs (279)

CVE-2024-37143
10.0

This CVE describes an Improper Link Resolution Before File Access vulnerability in multiple Dell PowerFlex and related products. An unauthenticated at...

Dec 10, 2024
CVE-2024-28185
10.0

CVE-2024-28185 is a critical symlink vulnerability in Judge0 that allows attackers to write arbitrary files outside the sandbox, potentially leading t...

Apr 18, 2024
CVE-2025-66277
9.8

This CVE describes a link following vulnerability in QNAP operating systems that allows remote attackers to traverse the file system to unintended loc...

Feb 11, 2026
CVE-2025-43220
9.8

This vulnerability allows malicious applications to bypass symlink validation and access protected user data on Apple devices. It affects users runnin...

Jul 30, 2025
CVE-2025-30457
9.8

This macOS vulnerability allows malicious applications to create symbolic links to protected disk regions, potentially bypassing security restrictions...

Mar 31, 2025
CVE-2024-48862
9.8

CVE-2024-48862 is a path traversal vulnerability in QNAP's QuLog Center that allows remote attackers to access or modify files outside the intended di...

Nov 22, 2024
CVE-2024-6868
9.8

CVE-2024-6868 is a critical vulnerability in mudler/LocalAI version 2.17.1 that allows arbitrary file write through improper archive extraction handli...

Oct 29, 2024
CVE-2022-26612
9.8

This vulnerability in Apache Hadoop allows attackers to write arbitrary files outside the intended extraction directory on Windows systems during TAR ...

Apr 7, 2022
CVE-2021-21691
9.8

This vulnerability allows Jenkins agents to create symbolic links on the controller without proper permission checks. Attackers with agent access can ...

Nov 4, 2021
CVE-2020-27172
9.8

This vulnerability in G-Data antivirus software allows attackers to use symbolic links to abuse the infected-file restore mechanism, leading to arbitr...

Dec 28, 2020
CVE-2024-10007
9.1

This CVE describes a path collision vulnerability in GitHub Enterprise Server that allows container escape and arbitrary code execution with root priv...

Nov 7, 2024
CVE-2024-3829
9.1

CVE-2024-3829 is a path traversal vulnerability in qdrant/qdrant that allows attackers to read and write arbitrary files during snapshot recovery. By ...

Jun 3, 2024
CVE-2021-38570
9.1

This vulnerability in Foxit Reader and PhantomPDF allows attackers to delete arbitrary files during uninstallation via symbolic link manipulation. It ...

Aug 11, 2021
CVE-2025-41666
8.8

This vulnerability allows a low-privileged remote attacker with file access to replace a critical watchdog file, gaining read, write, and execute acce...

Jul 8, 2025
CVE-2025-41668
8.8

CVE-2025-41668 allows a low-privileged remote attacker with file access to replace critical files used by the service security-profile, gaining read, ...

Jul 8, 2025
CVE-2025-47181
8.8

This CVE describes a local privilege escalation vulnerability in Microsoft Edge where an attacker can exploit improper link resolution to gain elevate...

May 22, 2025
CVE-2024-12390
8.8

This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of binary-husky/gpt_academic. Attackers ca...

Mar 20, 2025
CVE-2024-10986
8.8

GPT Academic version 3.83 contains a Local File Inclusion vulnerability in its HotReload function that allows attackers to read arbitrary files on the...

Mar 20, 2025
CVE-2024-50404
8.8

This CVE describes a link following vulnerability in Qsync Central that allows remote attackers with user access to traverse the file system to uninte...

Dec 6, 2024
CVE-2024-27458
8.8

This vulnerability in HP Hotkey Support software allows local attackers to escalate privileges on affected HP systems. It affects users of HP Programm...

Oct 7, 2024
CVE-2024-44132
8.8

A macOS sandbox escape vulnerability allows malicious applications to bypass security restrictions by exploiting improper symlink handling. This affec...

Sep 17, 2024
CVE-2024-28916
8.8

This vulnerability allows attackers to elevate privileges on Windows systems running Xbox Gaming Services. An authenticated attacker could exploit thi...

Mar 21, 2024
CVE-2023-33245
8.8

This vulnerability in Minecraft Java Edition allows attackers to overwrite arbitrary files and potentially execute code by crafting malicious world da...

May 30, 2023
CVE-2022-0799
8.8

This vulnerability allows a remote attacker to escalate privileges on Windows systems by tricking users into running a malicious Chrome offline instal...

Apr 5, 2022
CVE-2021-21695
8.8

This vulnerability in Jenkins allows agents to access files outside their permitted directories by exploiting symbolic links. Attackers can read sensi...

Nov 4, 2021
CVE-2026-24884
8.4

This vulnerability in the Compressing library allows attackers to write files to arbitrary locations on the host filesystem by exploiting improper sym...

Feb 4, 2026
CVE-2023-53973
8.4

This vulnerability in Zillya Total Security allows low-privileged users to escalate privileges by exploiting the quarantine module's file restoration ...

Dec 22, 2025
CVE-2023-31003
8.4

This vulnerability allows a local user on IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0-10.0.6.1 and IBM Securi...

Jan 11, 2024
CVE-2023-25152
8.4

This vulnerability in Pterodactyl Wings allows attackers with existing server access to create arbitrary files and directories on the host system. Thi...

Feb 8, 2023
CVE-2021-41641
8.4

This vulnerability in Deno's file sandbox allows attackers to bypass directory restrictions via symbolic links. When Deno is run with write permission...

Jun 12, 2022
CVE-2025-20003
8.2

This vulnerability in Intel Graphics Driver installers allows authenticated local users to exploit improper link resolution (symlink attacks) to escal...

May 13, 2025
CVE-2021-23892
8.2

This vulnerability allows local users on Linux systems running McAfee Endpoint Security to escalate privileges to root/admin level through a race cond...

May 12, 2021
CVE-2023-28868
8.1

This vulnerability in NCP Secure Enterprise Client's Support Assistant allows attackers to delete arbitrary files on the operating system by exploitin...

Dec 9, 2023
CVE-2023-46654
8.1

The Jenkins CloudBees CD Plugin vulnerability allows attackers with job configuration permissions to delete arbitrary files on the Jenkins controller ...

Oct 25, 2023
CVE-2021-30356
8.1

A privilege escalation vulnerability in Check Point Identity Agent allows low-privileged users to overwrite protected system files, potentially leadin...

Apr 22, 2021
CVE-2022-31466
7.9

A Time-of-Check-Time-of-Use (TOCTOU) vulnerability in Quick Heal Total Security allows local attackers to escalate privileges by replacing malicious f...

May 23, 2022
CVE-2026-2627
7.8

This vulnerability in Softland FBackup allows local attackers to exploit a link following weakness (CWE-59) in the HID.dll library during backup/resto...

Feb 17, 2026
CVE-2026-20610
7.8

A macOS vulnerability allows malicious applications to gain root privileges through improper symlink handling. This affects macOS systems before versi...

Feb 11, 2026
CVE-2025-15310
7.8

CVE-2025-15310 is a local privilege escalation vulnerability in Tanium Patch Endpoint Tools that allows authenticated local users to gain elevated pri...

Feb 10, 2026
CVE-2025-15319
7.8

CVE-2025-15319 is a local privilege escalation vulnerability in Tanium's Endpoint Configuration Toolset Solution that allows authenticated local users...

Feb 9, 2026
CVE-2026-20941
7.8

This vulnerability allows an authenticated attacker to exploit improper link resolution in the Windows Task Host process to elevate privileges locally...

Jan 13, 2026
CVE-2025-7073
7.8

This CVE describes a local privilege escalation vulnerability in Bitdefender Total Security where low-privileged attackers can delete arbitrary files ...

Dec 10, 2025
CVE-2025-60710
7.8

This vulnerability allows an authorized attacker to exploit improper link resolution in the Host Process for Windows Tasks to elevate privileges local...

Nov 11, 2025
CVE-2025-9871
7.8

A local privilege escalation vulnerability in Razer Synapse 3's Chroma Connect SDK installer allows attackers to delete arbitrary files via symbolic l...

Oct 29, 2025
CVE-2025-9869
7.8

This vulnerability in Razer Synapse 3 allows local attackers to escalate privileges by exploiting a symbolic link issue in the Razer Synapse Service. ...

Oct 29, 2025
CVE-2025-12341
7.8

This vulnerability in AntiDupl software allows local attackers to exploit link following (symlink attack) through the Delete Duplicate Image Handler f...

Oct 28, 2025
CVE-2025-59281
7.8

This CVE describes a local privilege escalation vulnerability in XBox Gaming Services where an authorized attacker can exploit improper link resolutio...

Oct 14, 2025
CVE-2025-62363
7.8

This vulnerability allows attackers with write access to the configuration file or filesystem to replace the yt-dlp executable with malicious code or ...

Oct 13, 2025
CVE-2025-11462
7.8

This vulnerability in AWS VPN Client for macOS allows local users to escalate privileges to root by exploiting improper symlink validation during log ...

Oct 7, 2025
CVE-2025-34194
7.8

This vulnerability allows local unprivileged users to escalate privileges to SYSTEM level by exploiting insecure temporary file handling in Vasion Pri...

Sep 19, 2025

About CWE-59 (CWE-59)

Our database tracks 279 CVEs classified as CWE-59, with 13 rated critical and 198 rated high severity. The average CVSS score for CWE-59 vulnerabilities is 7.4.

External reference: View CWE-59 on MITRE CWE →

Monitor CWE-59 Vulnerabilities

Get alerted when new CWE-59 CVEs affect your infrastructure.

Start Monitoring Free