logo

CWE TOP 25


Summary

Common Weakness Enumeration Top 25 (CWE Top 25) is a demonstrative list and valuable community resource of the most common and impactful issues experienced over the previous two calendar years. It can help developers, testers and users to provide insight into the most severe and current security weaknesses. The version used in this section is CWE Top 25 2023.


Definitions

DefinitionRequirements
CWE25-20. Improper input validation
CWE25-22. Improper limitation of a pathname to a restricted directory (path traversal)
CWE25-77. Improper neutralization of special elements used in a command (command injection)
CWE25-78. Improper neutralization of special elements used in an OS command (OS command injection)
CWE25-79. Improper neutralization of input during web page generation (cross-site scripting)
CWE25-89. Improper neutralization of special elements used in an SQL command (SQL injection)
CWE25-94. Improper Control of Generation of Code ('Code Injection')
CWE25-119. Improper restriction of operations within the bounds of a memory buffer
CWE25-125. Out-of-bounds read
CWE25-190. Integer overflow or wraparound
CWE25-269. Improper Privilege Management
CWE25-276. Incorrect Default Permissions
CWE25-287. Improper authentication
CWE25-306. Missing authentication for critical function
CWE25-352. Cross-site request forgery (CSRF)
CWE25-362. Concurrent execution using shared resource with improper synchronization (Race condition)
CWE25-416. User after free
CWE25-434. Unrestricted upload of file with dangerous type
CWE25-476. NULL pointer dereference
CWE25-502. Deserialization of untrusted data
CWE25-787. Out-of-bounds Write
CWE25-798. Use of hard-coded credentials
CWE25-862. Missing authorization
CWE25-863. Incorrect Authorization
CWE25-918. Server-side request forgery (SSRF)

Last updated

2024/02/02