logo

Database

CWE TOP 25

Last updated: 2024/02/02
logo

Common Weakness Enumeration Top 25 (CWE Top 25) is a demonstrative list and valuable community resource of the most common and impactful issues experienced over the previous two calendar years. It can help developers, testers and users to provide insight into the most severe and current security weaknesses. The version used in this section is CWE Top 25 2023.

Control-Requirement Mapping

DefinitionRequirements
20. Improper input validation
22. Improper limitation of a pathname to a restricted directory (path traversal)
77. Improper neutralization of special elements used in a command (command injection)
78. Improper neutralization of special elements used in an OS command (OS command injection)
79. Improper neutralization of input during web page generation (cross-site scripting)
89. Improper neutralization of special elements used in an SQL command (SQL injection)
94. Improper Control of Generation of Code ('Code Injection')
119. Improper restriction of operations within the bounds of a memory buffer
125. Out-of-bounds read
190. Integer overflow or wraparound
269. Improper Privilege Management
276. Incorrect Default Permissions
287. Improper authentication
306. Missing authentication for critical function
352. Cross-site request forgery (CSRF)
362. Concurrent execution using shared resource with improper synchronization (Race condition)
416. User after free
434. Unrestricted upload of file with dangerous type
476. NULL pointer dereference
502. Deserialization of untrusted data
787. Out-of-bounds Write
798. Use of hard-coded credentials
862. Missing authorization
863. Incorrect Authorization
918. Server-side request forgery (SSRF)