logo

CWE™


Summary

Common Weakness Enumeration is a community-developed list of software and hardware weakness types. It serves as a common language, a measuring stick for security tools, and as a baseline for weakness identification, mitigation and prevention efforts. - Version used: CWE™ List 4.13 - Last official version: CWE™ List 4.13


Definitions

DefinitionRequirements
CWE-5. Data transmission without encryption
CWE-6. Misconfiguration - Insufficient session-ID length
CWE-11. Creating debug binary
CWE-13. Misconfiguration - Password in configuration file
CWE-15. External control of system or configuration setting
CWE-20. Improper input validation
CWE-22. Improper limitation of a pathname to a restricted directory ("path traversal")
CWE-23. Relative path traversal
CWE-36. Absolute path traversal
CWE-73. External control of file name or path
CWE-74. Improper neutralization of special elements in output used by a downstream component ("injection")
CWE-78. Improper neutralization of special elements used in an OS command ("OS command injection")
CWE-79. Improper neutralization of input during web page generation ("cross-site scripting")
CWE-80. Improper neutralization of script-related HTML tags in a web page (basic XSS)
CWE-89. Improper neutralization of special elements used in an SQL command ("SQL injection")
CWE-90. Improper neutralization of special elements used in an LDAP query ('LDAP Injection')
CWE-91. XML injection
CWE-94. Improper control of generation of code ("code injection")
CWE-95. Improper neutralization of directives in dynamically evaluated code ("eval injection")
CWE-98. Improper control of filename for include/require statement in PHP program ("PHP remote file inclusion")
CWE-112. Missing XML validation
CWE-114. Process control
CWE-116. Improper encoding or escaping of output
CWE-117. Improper output neutralization for logs
CWE-120. Buffer copy without checking size of input ("classic buffer overflow")
CWE-130. Buffer copy without checking size of input ("classic buffer overflow")
CWE-134. Use of externally-controlled format string
CWE-138. Improper neutralization of special elements
CWE-147. Improper neutralization of input terminators
CWE-150. Improper neutralization of escape, meta, or control sequences
CWE-170. Improper null termination
CWE-173. Improper handling of alternate encoding
CWE-190. Integer overflow or wraparound
CWE-200. Exposure of sensitive information to an unauthorized actor
CWE-203. Observable discrepancy
CWE-208. Observable timing discrepancy
CWE-209. Generation of error message containing sensitive information
CWE-210. Self-generated error message containing sensitive information
CWE-212. Improper removal of sensitive information before storage or transfer
CWE-219. Storage of file with sensitive data under web root
CWE-221. Information loss or omission
CWE-223. Omission of security-relevant information
CWE-226. Sensitive information in resource not removed before reuse
CWE-233. Improper handling of parameters
CWE-235. Improper handling of extra parameters
CWE-250. Execution with unnecessary privileges
CWE-256. Plaintext storage of a password
CWE-257. Storing passwords in a recoverable format
CWE-259. Use of hard-coded password
CWE-263. Password aging with long expiration
CWE-266. Incorrect privilege assignment
CWE-267. Privilege defined with unsafe actions
CWE-269. Improper privilege management
CWE-272. Least privilege violation
CWE-276. Incorrect default permissions
CWE-284. Improper access control
CWE-285. Improper authorization
CWE-287. Improper authentication
CWE-290. Authentication bypass by spoofing
CWE-294. Authentication bypass by capture-replay
CWE-295. Improper certificate validation
CWE-297. Improper validation of certificate with host mismatch
CWE-298. Improper validation of certificate expiration
CWE-299. Improper check for certificate revocation
CWE-306. Missing authentication for critical function
CWE-307. Improper restriction of excessive authentication attempts
CWE-308. Use of single-factor authentication
CWE-311. Missing encryption of sensitive data
CWE-319. Cleartext transmission of sensitive information
CWE-321. Use of hard-coded cryptographic key
CWE-322. Key exchange without entity authentication
CWE-323. Reusing a nonce, key Pair in encryption
CWE-324. Use of a key past its expiration date
CWE-326. Inadequate encryption strength
CWE-327. Use of a broken or risky cryptographic algorithm
CWE-328. Use of weak hash
CWE-330. Use of insufficiently random values
CWE-331. Insufficient entropy
CWE-334. Small space of random values
CWE-340. Generation of predictable numbers or identifiers
CWE-345. Insufficient verification of data authenticity
CWE-346. Origin validation error
CWE-347. Improper verification of cryptographic signature
CWE-350. Reliance on reverse DNS resolution for a security-critical action
CWE-352. Cross-site request forgery (CSRF)
CWE-353. Missing support for integrity check
CWE-359. Exposure of private personal information to an unauthorized actor
CWE-362. Concurrent execution using shared resource with improper synchronization ("race condition")
CWE-367. Time-of-check time-of-use (TOCTOU) race condition
CWE-377. Insecure temporary file
CWE-384. Session fixation
CWE-390. Detection of error condition without action
CWE-396. Declaration of catch for generic exception
CWE-397. Declaration of throws for generic exception
CWE-400. Uncontrolled resource consumption
CWE-404. Improper resource shutdown or release
CWE-409. Improper handling of highly compressed data (data amplification)
CWE-419. Unprotected primary channel
CWE-434. Unrestricted upload of file with dangerous type
CWE-444. Inconsistent interpretation of HTTP requests ("HTTP request smuggling")
CWE-453. Insecure default variable initialization
CWE-456. Missing initialization of a variable
CWE-457. Use of uninitialized variable
CWE-459. Incomplete cleanup
CWE-494. Download of code without integrity check
CWE-497. Exposure of sensitive system information to an unauthorized control sphere
CWE-502. Deserialization of untrusted data
CWE-507. Trojan horse
CWE-509. Replicating malicious code (virus or worm)
CWE-510. Trapdoor
CWE-511. Logic/Time bomb
CWE-512. Spyware
CWE-521. Weak password requirements
CWE-522. Insufficiently protected credentials
CWE-523. Unprotected transport of credentials
CWE-524. Use of cache containing sensitive information
CWE-525. Use of web browser cache containing sensitive information
CWE-526. Cleartext Storage of Sensitive Information in an Environment Variable
CWE-532. Insertion of sensitive information into log file
CWE-539. Use of persistent cookies containing sensitive information
CWE-540. Inclusion of sensitive information in source code
CWE-548. Exposure of information through directory listing
CWE-549. Missing password field masking
CWE-598. Use of GET request method with sensitive query strings
CWE-601. URL redirection to untrusted site ("open redirect")
CWE-602. Client-side enforcement of server-side security
CWE-603. Use of client-side authentication
CWE-611. Improper restriction of XML External Entity reference
CWE-613. Insufficient session expiration
CWE-614. Sensitive cookie in HTTPS session without 'secure' attribute
CWE-615. Inclusion of sensitive information in source code comments
CWE-620. Unverified password change
CWE-639. Authorization bypass through user-controlled key
CWE-640. Weak password recovery mechanism for forgotten password
CWE-642. External control of critical state data
CWE-643. Improper neutralization of data within XPath expressions ("XPath injection")
CWE-644. Improper neutralization of HTTP headers for scripting syntax
CWE-645. Overly restrictive account lockout mechanism
CWE-646. Reliance on file name or extension of externally-supplied file
CWE-651. Exposure of WSDL file containing sensitive information
CWE-693. Protection mechanism failure
CWE-710. Improper adherence to coding standards
CWE-732. Incorrect permission assignment for critical resource
CWE-749. Exposed dangerous method or function
CWE-759. Use of a one-way hash without a salt
CWE-760. Use of a one-way hash with a predictable salt
CWE-770. Allocation of resources without limits or throttling
CWE-778. Insufficient logging
CWE-779. Logging of excessive data
CWE-780. Use of RSA algorithm without OAEP
CWE-798. Use of hard-coded credentials
CWE-799. Improper control of interaction frequency
CWE-804. Guessable CAPTCHA
CWE-830. Inclusion of web functionality from an untrusted source
CWE-838. Inappropriate encoding for output context
CWE-862. Missing authorization
CWE-915. Improperly controlled modification of dynamically-determined object attributes
CWE-916. Use of password hash with insufficient computational effort
CWE-918. Server-side request forgery (SSRF)
CWE-922. Insecure storage of sensitive information
CWE-923. Improper restriction of communication channel to intended endpoints
CWE-1004. Sensitive cookie without 'HttpOnly' flag
CWE-1021. Improper restriction of rendered UI layers or frames
CWE-1022. Use of web link to untrusted target with window.opener access
CWE-1041. Use of redundant code
CWE-1085. Invokable control element with excessive volume of commented-out code
CWE-1120. Excessive code complexity
CWE-1121. Excessive McCabe cyclomatic complexity
CWE-1192. System-on-Chip (SoC) using components without unique identifiers
CWE-1204. Generation of weak initialization vector (IV)
CWE-1230. Exposure of sensitive information through metadata
CWE-1233. Improper hardware lock protection for security sensitive controls
CWE-1262. Improper access control for register interface
CWE-1269. Product released in non-release configuration
CWE-1272. Sensitive information uncleared before debug/power state transition
CWE-1275. Sensitive cookie with improper sameSite attribute
CWE-1284. Improper validation of specified quantity in input
CWE-1287. Improper validation of specified type of input
CWE-1295. Debug messages revealing unnecessary information
CWE-1325. Improperly controlled sequential memory allocation
CWE-1390. Weak Authentication
CWE-1391. Use of Weak Credentials
CWE-1392. Use of Default Credentials
CWE-1393. Use of Default Password
CWE-1394. Use of Default Cryptographic Key
CWE-1395. Dependency on Vulnerable Third-Party Component
CWE-1419. Incorrect Initialization of Resource

Last updated

2025/07/08