logo

Database

CWE™

Last updated: 2025/07/08
logo

Common Weakness Enumeration is a community-developed list of software and hardware weakness types. It serves as a common language, a measuring stick for security tools, and as a baseline for weakness identification, mitigation and prevention efforts. - Version used: CWE™ List 4.13 - Last official version: CWE™ List 4.13

Control-Requirement Mapping

DefinitionRequirements
5. Data transmission without encryption
6. Misconfiguration - Insufficient session-ID length
11. Creating debug binary
13. Misconfiguration - Password in configuration file
15. External control of system or configuration setting
20. Improper input validation
22. Improper limitation of a pathname to a restricted directory ("path traversal")
23. Relative path traversal
36. Absolute path traversal
73. External control of file name or path
74. Improper neutralization of special elements in output used by a downstream component ("injection")
78. Improper neutralization of special elements used in an OS command ("OS command injection")
79. Improper neutralization of input during web page generation ("cross-site scripting")
80. Improper neutralization of script-related HTML tags in a web page (basic XSS)
89. Improper neutralization of special elements used in an SQL command ("SQL injection")
90. Improper neutralization of special elements used in an LDAP query ('LDAP Injection')
91. XML injection
94. Improper control of generation of code ("code injection")
95. Improper neutralization of directives in dynamically evaluated code ("eval injection")
98. Improper control of filename for include/require statement in PHP program ("PHP remote file inclusion")
112. Missing XML validation
114. Process control
116. Improper encoding or escaping of output
117. Improper output neutralization for logs
120. Buffer copy without checking size of input ("classic buffer overflow")
130. Buffer copy without checking size of input ("classic buffer overflow")
134. Use of externally-controlled format string
138. Improper neutralization of special elements
147. Improper neutralization of input terminators
150. Improper neutralization of escape, meta, or control sequences
170. Improper null termination
173. Improper handling of alternate encoding
190. Integer overflow or wraparound
200. Exposure of sensitive information to an unauthorized actor
203. Observable discrepancy
208. Observable timing discrepancy
209. Generation of error message containing sensitive information
210. Self-generated error message containing sensitive information
212. Improper removal of sensitive information before storage or transfer
219. Storage of file with sensitive data under web root
221. Information loss or omission
223. Omission of security-relevant information
226. Sensitive information in resource not removed before reuse
233. Improper handling of parameters
235. Improper handling of extra parameters
250. Execution with unnecessary privileges
256. Plaintext storage of a password
257. Storing passwords in a recoverable format
259. Use of hard-coded password
263. Password aging with long expiration
266. Incorrect privilege assignment
267. Privilege defined with unsafe actions
269. Improper privilege management
272. Least privilege violation
276. Incorrect default permissions
284. Improper access control
285. Improper authorization
287. Improper authentication
290. Authentication bypass by spoofing
294. Authentication bypass by capture-replay
295. Improper certificate validation
297. Improper validation of certificate with host mismatch
298. Improper validation of certificate expiration
299. Improper check for certificate revocation
306. Missing authentication for critical function
307. Improper restriction of excessive authentication attempts
308. Use of single-factor authentication
311. Missing encryption of sensitive data
319. Cleartext transmission of sensitive information
321. Use of hard-coded cryptographic key
322. Key exchange without entity authentication
323. Reusing a nonce, key Pair in encryption
324. Use of a key past its expiration date
326. Inadequate encryption strength
327. Use of a broken or risky cryptographic algorithm
328. Use of weak hash
330. Use of insufficiently random values
331. Insufficient entropy
334. Small space of random values
340. Generation of predictable numbers or identifiers
345. Insufficient verification of data authenticity
346. Origin validation error
347. Improper verification of cryptographic signature
350. Reliance on reverse DNS resolution for a security-critical action
352. Cross-site request forgery (CSRF)
353. Missing support for integrity check
359. Exposure of private personal information to an unauthorized actor
362. Concurrent execution using shared resource with improper synchronization ("race condition")
367. Time-of-check time-of-use (TOCTOU) race condition
377. Insecure temporary file
384. Session fixation
390. Detection of error condition without action
396. Declaration of catch for generic exception
397. Declaration of throws for generic exception
400. Uncontrolled resource consumption
404. Improper resource shutdown or release
409. Improper handling of highly compressed data (data amplification)
419. Unprotected primary channel
434. Unrestricted upload of file with dangerous type
444. Inconsistent interpretation of HTTP requests ("HTTP request smuggling")
453. Insecure default variable initialization
456. Missing initialization of a variable
457. Use of uninitialized variable
459. Incomplete cleanup
494. Download of code without integrity check
497. Exposure of sensitive system information to an unauthorized control sphere
502. Deserialization of untrusted data
507. Trojan horse
509. Replicating malicious code (virus or worm)
510. Trapdoor
511. Logic/Time bomb
512. Spyware
521. Weak password requirements
522. Insufficiently protected credentials
523. Unprotected transport of credentials
524. Use of cache containing sensitive information
525. Use of web browser cache containing sensitive information
526. Cleartext Storage of Sensitive Information in an Environment Variable
532. Insertion of sensitive information into log file
539. Use of persistent cookies containing sensitive information
540. Inclusion of sensitive information in source code
548. Exposure of information through directory listing
549. Missing password field masking
598. Use of GET request method with sensitive query strings
601. URL redirection to untrusted site ("open redirect")
602. Client-side enforcement of server-side security
603. Use of client-side authentication
611. Improper restriction of XML External Entity reference
613. Insufficient session expiration
614. Sensitive cookie in HTTPS session without 'secure' attribute
615. Inclusion of sensitive information in source code comments
620. Unverified password change
639. Authorization bypass through user-controlled key
640. Weak password recovery mechanism for forgotten password
642. External control of critical state data
643. Improper neutralization of data within XPath expressions ("XPath injection")
644. Improper neutralization of HTTP headers for scripting syntax
645. Overly restrictive account lockout mechanism
646. Reliance on file name or extension of externally-supplied file
651. Exposure of WSDL file containing sensitive information
693. Protection mechanism failure
710. Improper adherence to coding standards
732. Incorrect permission assignment for critical resource
749. Exposed dangerous method or function
759. Use of a one-way hash without a salt
760. Use of a one-way hash with a predictable salt
770. Allocation of resources without limits or throttling
778. Insufficient logging
779. Logging of excessive data
780. Use of RSA algorithm without OAEP
798. Use of hard-coded credentials
799. Improper control of interaction frequency
804. Guessable CAPTCHA
830. Inclusion of web functionality from an untrusted source
838. Inappropriate encoding for output context
862. Missing authorization
915. Improperly controlled modification of dynamically-determined object attributes
916. Use of password hash with insufficient computational effort
918. Server-side request forgery (SSRF)
922. Insecure storage of sensitive information
923. Improper restriction of communication channel to intended endpoints
1004. Sensitive cookie without 'HttpOnly' flag
1021. Improper restriction of rendered UI layers or frames
1022. Use of web link to untrusted target with window.opener access
1041. Use of redundant code
1085. Invokable control element with excessive volume of commented-out code
1120. Excessive code complexity
1121. Excessive McCabe cyclomatic complexity
1192. System-on-Chip (SoC) using components without unique identifiers
1204. Generation of weak initialization vector (IV)
1230. Exposure of sensitive information through metadata
1233. Improper hardware lock protection for security sensitive controls
1262. Improper access control for register interface
1269. Product released in non-release configuration
1272. Sensitive information uncleared before debug/power state transition
1275. Sensitive cookie with improper sameSite attribute
1284. Improper validation of specified quantity in input
1287. Improper validation of specified type of input
1295. Debug messages revealing unnecessary information
1325. Improperly controlled sequential memory allocation
1390. Weak Authentication
1391. Use of Weak Credentials
1392. Use of Default Credentials
1393. Use of Default Password
1394. Use of Default Cryptographic Key
1395. Dependency on Vulnerable Third-Party Component
1419. Incorrect Initialization of Resource