CWE-94: Code Injection
The product constructs all or part of a code segment using externally-influenced input, but does not neutralize special elements that could modify the intended code segment.
Yearly Trend
Top Affected Vendors
All Code Injection CVEs (1,187)
The Listingo WordPress theme allows unauthenticated attackers to execute arbitrary shortcodes due to improper input validation. This vulnerability aff...
Mar 5, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running xxyopen novel plus version 4.4.0 and earlier. The flaw exists ...
Mar 4, 2025PHPJabbers Cleaning Business Software v1.0 has a CSV injection vulnerability that allows attackers to execute arbitrary code when malicious CSV files ...
Feb 20, 2025PHPJabbers Restaurant Booking System v3.0 contains multiple HTML injection vulnerabilities in various parameters, allowing attackers to inject malicio...
Feb 20, 2025The AI Infographic Maker WordPress plugin allows unauthenticated attackers to execute arbitrary shortcodes due to improper input validation. This vuln...
Jan 31, 2025This vulnerability in Android's ZipFile.java allows attackers to execute arbitrary code by manipulating dynamic code loading through improper input va...
Jan 28, 2025This vulnerability allows authenticated users with restricted access in SAP BusinessObjects Business Intelligence Platform to inject malicious JavaScr...
Jan 14, 2025This vulnerability allows unauthenticated attackers to upload malicious PHP files through the car rental system's file upload feature, leading to remo...
Jan 13, 2025This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes through the CF7 WOW Styler plugin. Attackers can potenti...
Jan 7, 2025This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes through the WPMobile.App plugin. Attackers can potential...
Dec 13, 2024The Woodmart WordPress theme allows unauthenticated attackers to execute arbitrary shortcodes via a vulnerable AJAX endpoint. This vulnerability affec...
Dec 12, 2024This vulnerability allows remote attackers to execute arbitrary code on systems running ofcms 1.1.2 by exploiting improper input validation in the Fil...
Oct 25, 2024This vulnerability allows attackers to leak livechat messages by chaining two NoSQL injection vulnerabilities in Rocket.Chat's livechat system. The at...
Jul 12, 2024This Node.js vulnerability allows attackers to bypass network import restrictions by embedding non-network imports in data URLs, potentially leading t...
Jul 9, 2024This vulnerability allows remote code execution with administrator privileges on endpoints running CoSoSys Endpoint Protector or Unify agent. An attac...
Jun 27, 2024This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to execute arbitrary shortcodes through the Discussion ...
Oct 25, 2025The Inpersttion For Theme WordPress plugin has a remote code execution vulnerability that allows authenticated attackers with Contributor-level access...
Aug 15, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to execute arbitrary shortcodes through the Ninja Forms...
Dec 29, 2024The Pojo Forms WordPress plugin allows authenticated attackers with Subscriber-level access or higher to execute arbitrary shortcodes via a vulnerable...
Dec 6, 2024The InPost Gallery WordPress plugin allows authenticated attackers with Subscriber-level access or higher to execute arbitrary shortcodes via an AJAX ...
Nov 26, 2024This critical vulnerability in wuzhicms 4.1.0 allows remote attackers to inject and execute arbitrary code through the add/edit function in block.php....
Oct 30, 2024CVE-2024-45200 (KartLANPwn) is a stack-based buffer overflow vulnerability in Nintendo Mario Kart 8 Deluxe's LAN/LDN multiplayer implementation. Attac...
Sep 30, 2024This critical vulnerability in 123solar 1.8.4.5 allows remote attackers to execute arbitrary code by manipulating the PASSOx parameter in the config/c...
Sep 19, 2024CVE-2024-38990 is a prototype pollution vulnerability in Tada5hi sp-common v0.5.4's mergeDeep function that allows attackers to inject arbitrary prope...
Jul 1, 2024This CVE describes a SQL injection vulnerability in H3C SeaSQL DWS V2.0 that allows remote attackers to execute arbitrary code via crafted files. Orga...
Jun 20, 2024CVE-2025-65026 is a template literal injection vulnerability in esm.sh's CSS-to-JavaScript conversion feature that allows attackers to inject maliciou...
Nov 19, 2025SAP NetWeaver Application Server ABAP contains an HTML injection vulnerability that allows attackers to craft malicious URLs with script payloads. Whe...
Aug 12, 2025This vulnerability allows local system users to modify directory contents, potentially leading to arbitrary code execution with elevated permissions. ...
Jun 19, 2025This vulnerability allows attackers to execute arbitrary code on systems running vulnerable versions of KnowBe4's Phish Alert Button for Outlook by ex...
May 7, 2024This CVE describes a code injection vulnerability in FortiClientMac that allows unauthenticated attackers to execute arbitrary code by tricking users ...
Oct 14, 2025This CVE describes a potential remote code execution vulnerability in MariaDB v.11.1 through the lib_mysqludf_sys.so function. The vulnerability allow...
Oct 17, 2024This CVE describes a code injection vulnerability in waveterm's Electron Fuses implementation on macOS that allows bypassing TCC (Transparency, Consen...
Dec 12, 2025A file upload vulnerability in NestJS allows remote attackers to execute arbitrary code by manipulating the Content-Type header. This affects NestJS a...
Mar 14, 2025This vulnerability allows local attackers to execute arbitrary code via a malicious dynamic library (dylib) injection in RAR Extractor - Unarchiver Fr...
Jan 21, 2025This critical vulnerability in composiohq composio allows remote code execution through code injection in the Calculator function. Attackers can execu...
Sep 15, 2024This vulnerability in CPython's email module allows header injection when serializing email messages due to improper quoting of newlines in email head...
Aug 1, 2024The Shortcode Ajax WordPress plugin allows unauthenticated attackers to execute arbitrary shortcodes due to improper input validation. This vulnerabil...
Dec 13, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to execute arbitrary shortcodes via the ProfilePress pl...
Dec 9, 2025This is a cross-site scripting (XSS) vulnerability in DzzOffice 2.3.x that allows low-privilege attackers to inject malicious JavaScript into comment ...
Nov 18, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to execute arbitrary shortcodes through the Classified ...
Nov 17, 2025This vulnerability allows HTML injection via crafted Accept-Language headers in librechat version 0.7.9. When exploited, attackers can inject arbitrar...
Oct 22, 2025CVE-2025-42901 is a stored cross-site scripting (XSS) vulnerability in SAP Application Server for ABAP's BAPI explorer. Authenticated attackers can in...
Oct 14, 2025This CVE describes a code injection vulnerability in the WP User Frontend WordPress plugin that allows attackers to execute arbitrary code. It affects...
Sep 22, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to execute arbitrary shortcodes through the Everest For...
Apr 11, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to execute arbitrary shortcodes through the Global Gall...
Feb 12, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to execute arbitrary shortcodes through the Motors plug...
Jan 16, 2025MonicaHQ v4.1.1 contains an authenticated client-side injection vulnerability in the journal entry text field. This allows authenticated attackers to ...
Jan 10, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to execute arbitrary shortcodes through the Email Subsc...
Oct 2, 2024This CVE describes a code injection vulnerability in the FluentForm WordPress plugin that allows attackers to execute arbitrary shortcodes. Attackers ...
Jan 22, 2026The WPMasterToolkit WordPress plugin allows authenticated users with Contributor-level access or higher to inject and execute arbitrary PHP code throu...
Dec 12, 2025About Code Injection (CWE-94)
The product constructs all or part of a code segment using externally-influenced input, but does not neutralize special elements that could modify the intended code segment.
Our database tracks 1,187 CVEs classified as CWE-94, with 540 rated critical and 528 rated high severity. The average CVSS score for Code Injection vulnerabilities is 8.6.
External reference: View CWE-94 on MITRE CWE →
Monitor Code Injection Vulnerabilities
Get alerted when new Code Injection CVEs affect your infrastructure.
Start Monitoring Free