CWE-59: CWE-59

288
Total CVEs
13
Critical
207
High
7.4
Avg CVSS
1
In CISA KEV

Yearly Trend

2026
30
2025
90
2024
70
2023
40
2022
20

Top Affected Vendors

1 Microsoft 75
2 Apple 24
3 Trendmicro 13
4 Canonical 6
5 Dell 6
6 Google 5
7 Fedoraproject 4
8 Avast 4
9 Mcafee 4
10 Debian 4

All CWE-59 CVEs (288)

CVE-2024-37143
10.0

This CVE describes an Improper Link Resolution Before File Access vulnerability in multiple Dell PowerFlex and related products. An unauthenticated at...

Dec 10, 2024
CVE-2024-28185
10.0

CVE-2024-28185 is a critical symlink vulnerability in Judge0 that allows attackers to write arbitrary files outside the sandbox, potentially leading t...

Apr 18, 2024
CVE-2025-66277
9.8

This CVE describes a link following vulnerability in QNAP operating systems that allows remote attackers to traverse the file system to unintended loc...

Feb 11, 2026
CVE-2025-43220
9.8

This vulnerability allows malicious applications to bypass symlink validation and access protected user data on Apple devices. It affects users runnin...

Jul 30, 2025
CVE-2025-30457
9.8

This macOS vulnerability allows malicious applications to create symbolic links to protected disk regions, potentially bypassing security restrictions...

Mar 31, 2025
CVE-2024-48862
9.8

CVE-2024-48862 is a path traversal vulnerability in QNAP's QuLog Center that allows remote attackers to access or modify files outside the intended di...

Nov 22, 2024
CVE-2024-6868
9.8

CVE-2024-6868 is a critical vulnerability in mudler/LocalAI version 2.17.1 that allows arbitrary file write through improper archive extraction handli...

Oct 29, 2024
CVE-2022-26612
9.8

This vulnerability in Apache Hadoop allows attackers to write arbitrary files outside the intended extraction directory on Windows systems during TAR ...

Apr 7, 2022
CVE-2021-21691
9.8

This vulnerability allows Jenkins agents to create symbolic links on the controller without proper permission checks. Attackers with agent access can ...

Nov 4, 2021
CVE-2020-27172
9.8

This vulnerability in G-Data antivirus software allows attackers to use symbolic links to abuse the infected-file restore mechanism, leading to arbitr...

Dec 28, 2020
CVE-2024-10007
9.1

This CVE describes a path collision vulnerability in GitHub Enterprise Server that allows container escape and arbitrary code execution with root priv...

Nov 7, 2024
CVE-2024-3829
9.1

CVE-2024-3829 is a path traversal vulnerability in qdrant/qdrant that allows attackers to read and write arbitrary files during snapshot recovery. By ...

Jun 3, 2024
CVE-2021-38570
9.1

This vulnerability in Foxit Reader and PhantomPDF allows attackers to delete arbitrary files during uninstallation via symbolic link manipulation. It ...

Aug 11, 2021
CVE-2025-41666
8.8

This vulnerability allows a low-privileged remote attacker with file access to replace a critical watchdog file, gaining read, write, and execute acce...

Jul 8, 2025
CVE-2025-41668
8.8

CVE-2025-41668 allows a low-privileged remote attacker with file access to replace critical files used by the service security-profile, gaining read, ...

Jul 8, 2025
CVE-2025-47181
8.8

This CVE describes a local privilege escalation vulnerability in Microsoft Edge where an attacker can exploit improper link resolution to gain elevate...

May 22, 2025
CVE-2024-12390
8.8

This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of binary-husky/gpt_academic. Attackers ca...

Mar 20, 2025
CVE-2024-10986
8.8

GPT Academic version 3.83 contains a Local File Inclusion vulnerability in its HotReload function that allows attackers to read arbitrary files on the...

Mar 20, 2025
CVE-2024-50404
8.8

This CVE describes a link following vulnerability in Qsync Central that allows remote attackers with user access to traverse the file system to uninte...

Dec 6, 2024
CVE-2024-27458
8.8

This vulnerability in HP Hotkey Support software allows local attackers to escalate privileges on affected HP systems. It affects users of HP Programm...

Oct 7, 2024
CVE-2024-44132
8.8

A macOS sandbox escape vulnerability allows malicious applications to bypass security restrictions by exploiting improper symlink handling. This affec...

Sep 17, 2024
CVE-2024-28916
8.8

This vulnerability allows attackers to elevate privileges on Windows systems running Xbox Gaming Services. An authenticated attacker could exploit thi...

Mar 21, 2024
CVE-2023-33245
8.8

This vulnerability in Minecraft Java Edition allows attackers to overwrite arbitrary files and potentially execute code by crafting malicious world da...

May 30, 2023
CVE-2022-0799
8.8

This vulnerability allows a remote attacker to escalate privileges on Windows systems by tricking users into running a malicious Chrome offline instal...

Apr 5, 2022
CVE-2021-21695
8.8

This vulnerability in Jenkins allows agents to access files outside their permitted directories by exploiting symbolic links. Attackers can read sensi...

Nov 4, 2021
CVE-2026-24884
8.4

This vulnerability in the Compressing library allows attackers to write files to arbitrary locations on the host filesystem by exploiting improper sym...

Feb 4, 2026
CVE-2023-53973
8.4

This vulnerability in Zillya Total Security allows low-privileged users to escalate privileges by exploiting the quarantine module's file restoration ...

Dec 22, 2025
CVE-2023-31003
8.4

This vulnerability allows a local user on IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0-10.0.6.1 and IBM Securi...

Jan 11, 2024
CVE-2023-25152
8.4

This vulnerability in Pterodactyl Wings allows attackers with existing server access to create arbitrary files and directories on the host system. Thi...

Feb 8, 2023
CVE-2021-41641
8.4

This vulnerability in Deno's file sandbox allows attackers to bypass directory restrictions via symbolic links. When Deno is run with write permission...

Jun 12, 2022
CVE-2025-20003
8.2

This vulnerability in Intel Graphics Driver installers allows authenticated local users to exploit improper link resolution (symlink attacks) to escal...

May 13, 2025
CVE-2021-23892
8.2

This vulnerability allows local users on Linux systems running McAfee Endpoint Security to escalate privileges to root/admin level through a race cond...

May 12, 2021
CVE-2023-28868
8.1

This vulnerability in NCP Secure Enterprise Client's Support Assistant allows attackers to delete arbitrary files on the operating system by exploitin...

Dec 9, 2023
CVE-2023-46654
8.1

The Jenkins CloudBees CD Plugin vulnerability allows attackers with job configuration permissions to delete arbitrary files on the Jenkins controller ...

Oct 25, 2023
CVE-2021-30356
8.1

A privilege escalation vulnerability in Check Point Identity Agent allows low-privileged users to overwrite protected system files, potentially leadin...

Apr 22, 2021
CVE-2021-21300
8.0

This vulnerability allows remote code execution when cloning malicious Git repositories on case-insensitive file systems (Windows/macOS default). Atta...

Mar 9, 2021
CVE-2022-31466
7.9

A Time-of-Check-Time-of-Use (TOCTOU) vulnerability in Quick Heal Total Security allows local attackers to escalate privileges by replacing malicious f...

May 23, 2022
CVE-2026-2627
7.8

This vulnerability in Softland FBackup allows local attackers to exploit a link following weakness (CWE-59) in the HID.dll library during backup/resto...

Feb 17, 2026
CVE-2026-20610
7.8

A macOS vulnerability allows malicious applications to gain root privileges through improper symlink handling. This affects macOS systems before versi...

Feb 11, 2026
CVE-2025-15310
7.8

CVE-2025-15310 is a local privilege escalation vulnerability in Tanium Patch Endpoint Tools that allows authenticated local users to gain elevated pri...

Feb 10, 2026
CVE-2025-15319
7.8

CVE-2025-15319 is a local privilege escalation vulnerability in Tanium's Endpoint Configuration Toolset Solution that allows authenticated local users...

Feb 9, 2026
CVE-2026-20941
7.8

This vulnerability allows an authenticated attacker to exploit improper link resolution in the Windows Task Host process to elevate privileges locally...

Jan 13, 2026
CVE-2025-7073
7.8

This CVE describes a local privilege escalation vulnerability in Bitdefender Total Security where low-privileged attackers can delete arbitrary files ...

Dec 10, 2025
CVE-2025-60710
7.8

This vulnerability allows an authorized attacker to exploit improper link resolution in the Host Process for Windows Tasks to elevate privileges local...

Nov 11, 2025
CVE-2025-9871
7.8

A local privilege escalation vulnerability in Razer Synapse 3's Chroma Connect SDK installer allows attackers to delete arbitrary files via symbolic l...

Oct 29, 2025
CVE-2025-9869
7.8

This vulnerability in Razer Synapse 3 allows local attackers to escalate privileges by exploiting a symbolic link issue in the Razer Synapse Service. ...

Oct 29, 2025
CVE-2025-12341
7.8

This vulnerability in AntiDupl software allows local attackers to exploit link following (symlink attack) through the Delete Duplicate Image Handler f...

Oct 28, 2025
CVE-2025-59281
7.8

This CVE describes a local privilege escalation vulnerability in XBox Gaming Services where an authorized attacker can exploit improper link resolutio...

Oct 14, 2025
CVE-2025-62363
7.8

This vulnerability allows attackers with write access to the configuration file or filesystem to replace the yt-dlp executable with malicious code or ...

Oct 13, 2025
CVE-2025-11462
7.8

This vulnerability in AWS VPN Client for macOS allows local users to escalate privileges to root by exploiting improper symlink validation during log ...

Oct 7, 2025

About CWE-59 (CWE-59)

Our database tracks 288 CVEs classified as CWE-59, with 13 rated critical and 207 rated high severity. The average CVSS score for CWE-59 vulnerabilities is 7.4.

External reference: View CWE-59 on MITRE CWE →

Monitor CWE-59 Vulnerabilities

Get alerted when new CWE-59 CVEs affect your infrastructure.

Start Monitoring Free