CWE top 25 most dangerous software weaknesses


The CWE list of the 25 most dangerous software weaknesses demonstrates the currently most common and impactful software flaws. Identifying the root causes of these vulnerabilities provides insights to shape investments, policies, and practices that proactively prevent their occurrence.

The CWE top 25 most dangerous software weaknesses list was calculated by analyzing public vulnerability information in Common Vulnerabilities and Exposures (CVE) Records for CWE root cause mappings.

This year’s dataset included 31,770 CVE Records for vulnerabilities published between June 1, 2023 and June 1, 2024. Data was initially pulled on July 30, 2024, to share with CNA community partners for review. Data was pulled again on November 4, 2024, to ensure the most up-to-date CVE Records information was used in the top 25 list calculations. For more in-depth details about the methodology, go here.

CWE Top 25 for 2024

  1. CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
  2. CWE-787: Out-of-bounds Write
  3. CWE-89: Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)
  4. CWE-352: Cross-Site Request Forgery (CSRF)
  5. CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)
  6. CWE-125: Out-of-bounds Read
  7. CWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
  8. CWE-416: Use After Free
  9. CWE-862: Missing Authorization
  10. CWE-434: Unrestricted Upload of File with Dangerous Type
  11. CWE-94: Improper Control of Generation of Code (‘Code Injection’)
  12. CWE-20: Improper Input Validation
  13. CWE-77: Improper Neutralization of Special Elements used in a Command (‘Command Injection’)
  14. CWE-287: Improper Authentication
  15. CWE-269: Improper Privilege Management
  16. CWE-502: Deserialization of Untrusted Data
  17. CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  18. CWE-863: Incorrect Authorization
  19. CWE-918: Server-Side Request Forgery (SSRF)
  20. CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
  21. CWE-476: NULL Pointer Dereference
  22. CWE-798: Use of Hard-coded Credentials
  23. CWE-190: Integer Overflow or Wraparound
  24. CWE-400: Uncontrolled Resource Consumption
  25. CWE-306: Missing Authentication for Critical Function



Source link