CyberSecurityNews

MITRE Releases Top 25 Most Dangerous Software Weaknesses of 2025


MITRE has unveiled its 2025 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses list, highlighting the root causes behind 39,080 Common Vulnerability and Exposure (CVE) records this year.

These prevalent flaws, which are often simple to detect and exploit, enable attackers to seize system control, pilfer sensitive data, or cripple applications.

Developers, security teams, and executives now have a roadmap to prioritize fixes and reshape software development lifecycles (SDLC).

The annual ranking, based on real-world CVE data, has become increasingly relevant amid escalating cyber threats.

Injection flaws and memory corruption remain dominant, but shifts reveal evolving risks. Cross-site scripting (CWE-79) remains at the top despite slipping from last year’s lead, with seven Known Exploited Vulnerabilities (KEVs).

OS Command Injection (CWE-78) remains a high-impact threat, boasting 20 KEVs.

google

This list drives action across sectors:

  • Vulnerability Reduction: Pinpoints root causes like memory safety bugs, guiding SDLC improvements.
  • Cost Savings: Fewer flaws mean less post-release patching.
  • Trend Analysis: Tracks rises in authorization bypasses amid cloud expansions.
  • Exploitability Prioritization: KEV counts flag immediate dangers.
  • Customer Trust: Public commitments to fixes build confidence.

Newcomers like Classic Buffer Overflow (CWE-120) and Improper Access Control (CWE-284) signal memory and auth gaps in legacy codebases.

2025 CWE Top 25 Summary

RankCWE ID & NameCVEs in KEVRank Last Year
1CWE-79: Cross-site Scripting71
2CWE-89: SQL Injection43 (↑1)
3CWE-352: CSRF04 (↑1)
4CWE-862: Missing Authorization09 (↑5)
5CWE-787: Out-of-bounds Write122 (↓3)
6CWE-22: Path Traversal105 (↓1)
7CWE-416: Use After Free148 (↑1)
8CWE-125: Out-of-bounds Read36 (↓2)
9CWE-78: OS Command Injection207 (↓2)
10CWE-94: Code Injection711 (↑1)
11CWE-120: Classic Buffer Overflow0N/A
12CWE-434: Unrestricted File Upload410 (↓2)
13CWE-476: NULL Pointer Dereference021 (↑8)
14CWE-121: Stack-based Buffer Overflow4N/A
15CWE-502: Deserialization of Untrusted Data1116 (↑1)
16CWE-122: Heap-based Buffer Overflow6N/A
17CWE-863: Incorrect Authorization418 (↑1)
18CWE-20: Improper Input Validation212 (↓6)
19CWE-284: Improper Access Control1N/A
20CWE-200: Exposure of Sensitive Information117 (↓3)
21CWE-306: Missing Authentication1125 (↑4)
22CWE-918: SSRF019 (↓3)
23CWE-77: Command Injection213 (↓10)
24CWE-639: Authorization Bypass030 (↑6)
25CWE-770: Resource Allocation Without Limits026 (↑1)

Memory safety issues (e.g., buffer overflows) occur frequently, prompting the adoption of Rust or safer C++. Web apps face injection and auth woes, while KEV-heavy flaws like Use After Free demand zero-trust scrutiny.

Organizations should audit codebases against this list, integrate CWE checks into their CI/CD pipelines, and lobby vendors for transparency.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link