Modes Of Introduction
Architecture and Design : This weakness may occur when software designers choose to not leverage input validation frameworks provided by the source language.
Implementation : This weakness may occur when developers do not correctly use a provided input validation framework.
Applicable Platforms
Language
Class: Not Language-Specific (Undetermined)
Common Consequences
| Scope |
Impact |
Likelihood |
| Integrity | Unexpected State
Note: Unchecked input leads to cross-site scripting, process control, and SQL injection vulnerabilities, among others. | |
Potential Mitigations
Phases : Implementation
Properly use provided input validation frameworks.
Detection Methods
Automated Static Analysis
Array
Vulnerability Mapping Notes
Justification : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Comment : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Submission
| Name |
Organization |
Date |
Date release |
Version |
| CWE Content Team |
MITRE |
2018-12-21 +00:00 |
2019-01-03 +00:00 |
3.2 |
Modifications
| Name |
Organization |
Date |
Comment |
| CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2020-06-25 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2021-10-28 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Description |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |