CWE

Common Weakness Enumeration

A community-developed list of SW & HW weaknesses that can become vulnerabilities

New to CWE? click here!
CWE Most Important Hardware Weaknesses
CWE Top 25 Most Dangerous Weaknesses
Home > CWE List > Reports > Differences between Version 4.19.1 and Version 4.20  
ID

Differences between Version 4.19.1 and Version 4.20

Summary
Summary
Total weaknesses/chains/composites (Version 4.20) 944
Total weaknesses/chains/composites (Version 4.19.1) 944
Total new 3
Total deprecated 0
Total with major changes 128
Total with only minor changes 9
Total unchanged 1310

Summary of Entry Types

Type Version 4.19.1 Version 4.20
Weakness 944 944
Category 385 387
View 54 55
Deprecated 64 64
Total 1447 1450

Field Change Summary
Field Change Summary

Any change with respect to whitespace is ignored. "Minor" changes are text changes that only affect capitalization and punctuation. Most other changes are marked as "Major." Simple schema changes are treated as Minor, such as the change from AffectedResource to Affected_Resource in Draft 8, or the relationship name change from "IsRequiredBy" to "RequiredBy" in Version 1.0. For each mutual relationship between nodes A and B (such as ParentOf and ChildOf), a relationship change is noted for both A and B.

Field Major Minor
Name 1 0
Description 13 0
Diagram 9 0
Relationships 19 0
Common_Consequences 8 0
Applicable_Platforms 12 0
Modes_of_Introduction 5 0
Detection_Factors 13 0
Potential_Mitigations 32 11
Demonstrative_Examples 4 1
Observed_Examples 54 0
Related_Attack_Patterns 0 0
Weakness_Ordinalities 0 0
Time_of_Introduction 1 0
Likelihood_of_Exploit 0 0
References 10 0
Mapping_Notes 19 0
Terminology_Notes 0 0
Alternate_Terms 6 0
Relationship_Notes 0 0
Taxonomy_Mappings 0 0
Maintenance_Notes 5 0
Affected_Resources 0 0
Functional_Areas 0 0
Research_Gaps 2 0
Background_Details 5 0
Theoretical_Notes 0 0
Other_Notes 1 0
View_Type 0 0
View_Structure 0 0
View_Filter 0 0
View_Audience 0 0
Type 0 0
Source_Taxonomy 0 0

Form and Abstraction Changes

From To Total CWE IDs
Unchanged 1447

Status Changes

From To Total
Unchanged 1447

Relationship Changes

The "Version 4.20 Total" lists the total number of relationships in Version 4.20. The "Shared" value is the total number of relationships in entries that were in both Version 4.20 and Version 4.19.1. The "New" value is the total number of relationships involving entries that did not exist in Version 4.19.1. Thus, the total number of relationships in Version 4.20 would combine stats from Shared entries and New entries.

Relationship Version 4.20 Total Version 4.19.1 Total Version 4.20 Shared Unchanged Added to Version 4.20 Removed from Version 4.19.1 Version 4.20 New
ALL 13208 13162 13164 13162 2 44
ChildOf 5578 5557 5558 5557 1 20
ParentOf 5578 5557 5558 5557 1 20
MemberOf 764 762 762 762 2
HasMember 764 762 762 762 2
CanPrecede 143 143 143 143
CanFollow 143 143 143 143
StartsWith 3 3 3 3
Requires 13 13 13 13
RequiredBy 13 13 13 13
CanAlsoBe 27 27 27 27
PeerOf 182 182 182 182

Nodes Removed in Version 4.20

CWE-ID CWE Name
None.

Nodes Added to Version 4.20

CWE-ID CWE Name
1446 Weaknesses That are Specific to AI/ML Technology
1447 General Software Weaknesses that Appear in Products that Use or Support AI/ML Technology
1448 Weaknesses Related to AI/ML Products

Nodes Deprecated in Version 4.20

CWE-ID CWE Name
None.
Important Changes
Important Changes

A node change is labeled "important" if it is a major field change and the field is critical to the meaning of the node. The critical fields are description, name, and relationships.

Key
D Description
N Name
R Relationships

R 22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
R 77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
R 78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
R 79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
R 94 Improper Control of Generation of Code ('Code Injection')
R 95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
R 116 Improper Encoding or Escaping of Output
D 150 Improper Neutralization of Escape, Meta, or Control Sequences
D 203 Observable Discrepancy
R 250 Execution with Unnecessary Privileges
D 296 Improper Following of a Certificate's Chain of Trust
D 297 Improper Validation of Certificate with Host Mismatch
D 298 Improper Validation of Certificate Expiration
D 425 Direct Request ('Forced Browsing')
R 434 Unrestricted Upload of File with Dangerous Type
R 502 Deserialization of Untrusted Data
DN 598 Use of HTTP Request With Sensitive Query String
D 599 Missing Validation of OpenSSL Certificate
R 862 Missing Authorization
R 918 Server-Side Request Forgery (SSRF)
D 1004 Sensitive Cookie Without 'HttpOnly' Flag
D 1021 Improper Restriction of Rendered UI Layers or Frames
R 1039 Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
D 1333 Inefficient Regular Expression Complexity
R 1336 Improper Neutralization of Special Elements Used in a Template Engine
R 1357 Reliance on Insufficiently Trustworthy Component
D 1386 Insecure Operation on Windows Junction / Mount Point
D R 1395 Dependency on Vulnerable Third-Party Component
R 1426 Improper Validation of Generative AI Output
R 1427 Improper Neutralization of Input Used for LLM Prompting
R 1434 Insecure Setting of Generative AI/ML Model Inference Parameters
Detailed Difference Report
Detailed Difference Report
16 Configuration
Major Mapping_Notes
Minor None
20 Improper Input Validation
Major Applicable_Platforms, Mapping_Notes
Minor None
22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Major Alternate_Terms, Applicable_Platforms, Demonstrative_Examples, Relationships
Minor None
23 Relative Path Traversal
Major Applicable_Platforms
Minor None
26 Path Traversal: '/dir/../filename'
Major Observed_Examples
Minor None
36 Absolute Path Traversal
Major Applicable_Platforms
Minor None
44 Path Equivalence: 'file.name' (Internal Dot)
Major Observed_Examples
Minor None
74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Major Mapping_Notes
Minor None
75 Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
Major Mapping_Notes
Minor None
77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
Major Relationships
Minor None
78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Major Applicable_Platforms, Relationships
Minor None
79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Major Relationships
Minor Potential_Mitigations
80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Major None
Minor Potential_Mitigations
81 Improper Neutralization of Script in an Error Message Web Page
Major None
Minor Potential_Mitigations
82 Improper Neutralization of Script in Attributes of IMG Tags in a Web Page
Major None
Minor Potential_Mitigations
83 Improper Neutralization of Script in Attributes in a Web Page
Major None
Minor Potential_Mitigations
84 Improper Neutralization of Encoded URI Schemes in a Web Page
Major None
Minor Potential_Mitigations
85 Doubled Character XSS Manipulations
Major None
Minor Potential_Mitigations
86 Improper Neutralization of Invalid Characters in Identifiers in Web Pages
Major None
Minor Potential_Mitigations
87 Improper Neutralization of Alternate XSS Syntax
Major None
Minor Potential_Mitigations
88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Major Potential_Mitigations
Minor None
91 XML Injection (aka Blind XPath Injection)
Major Mapping_Notes
Minor None
94 Improper Control of Generation of Code ('Code Injection')
Major Potential_Mitigations, Relationships
Minor None
95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Major Applicable_Platforms, Potential_Mitigations, Relationships
Minor None
116 Improper Encoding or Escaping of Output
Major Relationships
Minor None
119 Improper Restriction of Operations within the Bounds of a Memory Buffer
Major Mapping_Notes, Observed_Examples
Minor None
150 Improper Neutralization of Escape, Meta, or Control Sequences
Major Alternate_Terms, Applicable_Platforms, Common_Consequences, Demonstrative_Examples, Description, Modes_of_Introduction, Observed_Examples, Potential_Mitigations, References, Research_Gaps, Time_of_Introduction
Minor None
185 Incorrect Regular Expression
Major Potential_Mitigations
Minor None
186 Overly Restrictive Regular Expression
Major Potential_Mitigations
Minor None
200 Exposure of Sensitive Information to an Unauthorized Actor
Major Maintenance_Notes, Mapping_Notes
Minor None
201 Insertion of Sensitive Information Into Sent Data
Major Observed_Examples
Minor None
203 Observable Discrepancy
Major Background_Details, Common_Consequences, Description, Diagram
Minor None
212 Improper Removal of Sensitive Information Before Storage or Transfer
Major Observed_Examples
Minor None
214 Invocation of Process Using Visible Sensitive Information
Major Observed_Examples
Minor None
242 Use of Inherently Dangerous Function
Major Potential_Mitigations, References
Minor None
250 Execution with Unnecessary Privileges
Major Alternate_Terms, Applicable_Platforms, Modes_of_Introduction, References, Relationships
Minor None
261 Weak Encoding for Password
Major Observed_Examples
Minor None
269 Improper Privilege Management
Major Mapping_Notes
Minor None
284 Improper Access Control
Major Mapping_Notes
Minor None
285 Improper Authorization
Major Mapping_Notes, Observed_Examples
Minor None
287 Improper Authentication
Major Mapping_Notes
Minor None
295 Improper Certificate Validation
Major Observed_Examples
Minor None
296 Improper Following of a Certificate's Chain of Trust
Major Background_Details, Description, Diagram
Minor None
297 Improper Validation of Certificate with Host Mismatch
Major Common_Consequences, Description, Diagram, Modes_of_Introduction
Minor None
298 Improper Validation of Certificate Expiration
Major Common_Consequences, Description, Diagram, Observed_Examples
Minor None
301 Reflection Attack in an Authentication Protocol
Major Observed_Examples
Minor None
311 Missing Encryption of Sensitive Data
Major Mapping_Notes
Minor None
316 Cleartext Storage of Sensitive Information in Memory
Major Observed_Examples
Minor None
323 Reusing a Nonce, Key Pair in Encryption
Major Observed_Examples
Minor None
330 Use of Insufficiently Random Values
Major Potential_Mitigations
Minor None
353 Missing Support for Integrity Check
Major Observed_Examples
Minor None
354 Improper Validation of Integrity Check Value
Major Observed_Examples
Minor None
362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Major Observed_Examples
Minor None
379 Creation of Temporary File in Directory with Insecure Permissions
Major Observed_Examples
Minor None
392 Missing Report of Error Condition
Major Observed_Examples
Minor None
400 Uncontrolled Resource Consumption
Major Applicable_Platforms, Maintenance_Notes, Mapping_Notes, Other_Notes
Minor None
401 Missing Release of Memory after Effective Lifetime
Major Alternate_Terms, Detection_Factors, Potential_Mitigations, References
Minor None
416 Use After Free
Major Common_Consequences, Observed_Examples
Minor None
425 Direct Request ('Forced Browsing')
Major Description, Diagram, Modes_of_Introduction, Observed_Examples
Minor None
427 Uncontrolled Search Path Element
Major References
Minor None
434 Unrestricted Upload of File with Dangerous Type
Major Applicable_Platforms, Relationships
Minor None
437 Incomplete Model of Endpoint Features
Major Observed_Examples
Minor None
451 User Interface (UI) Misrepresentation of Critical Information
Major Observed_Examples
Minor None
481 Assigning instead of Comparing
Major Detection_Factors, Potential_Mitigations
Minor Demonstrative_Examples
482 Comparing instead of Assigning
Major Detection_Factors
Minor None
489 Active Debug Code
Major Observed_Examples
Minor None
502 Deserialization of Untrusted Data
Major Alternate_Terms, Relationships
Minor None
506 Embedded Malicious Code
Major Potential_Mitigations
Minor None
524 Use of Cache Containing Sensitive Information
Major Observed_Examples
Minor None
525 Use of Web Browser Cache Containing Sensitive Information
Major Observed_Examples, Potential_Mitigations
Minor None
528 Exposure of Core Dump File to an Unauthorized Control Sphere
Major Observed_Examples
Minor None
530 Exposure of Backup File to an Unauthorized Control Sphere
Major Observed_Examples
Minor None
548 Exposure of Information Through Directory Listing
Major Observed_Examples
Minor None
549 Missing Password Field Masking
Major Observed_Examples
Minor None
561 Dead Code
Major Potential_Mitigations
Minor None
562 Return of Stack Variable Address
Major Potential_Mitigations
Minor None
568 finalize() Method Without super.finalize()
Major Potential_Mitigations
Minor None
570 Expression is Always False
Major Potential_Mitigations
Minor None
571 Expression is Always True
Major Potential_Mitigations
Minor None
586 Explicit Call to Finalize()
Major Potential_Mitigations
Minor None
590 Free of Memory not on the Heap
Major Detection_Factors, Observed_Examples, Potential_Mitigations
Minor None
591 Sensitive Data Storage in Improperly Locked Memory
Major Observed_Examples
Minor None
598 Use of HTTP Request With Sensitive Query String
Major Background_Details, Description, Name, Observed_Examples, Potential_Mitigations
Minor None
599 Missing Validation of OpenSSL Certificate
Major Common_Consequences, Description, Diagram
Minor None
606 Unchecked Input for Loop Condition
Major Observed_Examples
Minor None
613 Insufficient Session Expiration
Major Maintenance_Notes, Mapping_Notes, Observed_Examples, References
Minor None
620 Unverified Password Change
Major Observed_Examples
Minor None
621 Variable Extraction Error
Major Potential_Mitigations
Minor None
639 Authorization Bypass Through User-Controlled Key
Major Alternate_Terms, Maintenance_Notes, References
Minor None
640 Weak Password Recovery Mechanism for Forgotten Password
Major Observed_Examples
Minor None
642 External Control of Critical State Data
Major Detection_Factors, Potential_Mitigations
Minor None
662 Improper Synchronization
Major Maintenance_Notes, Research_Gaps
Minor None
665 Improper Initialization
Major Potential_Mitigations
Minor None
668 Exposure of Resource to Wrong Sphere
Major Mapping_Notes
Minor None
674 Uncontrolled Recursion
Major Potential_Mitigations
Minor None
676 Use of Potentially Dangerous Function
Major Potential_Mitigations, References
Minor None
682 Incorrect Calculation
Major Detection_Factors, Observed_Examples, Potential_Mitigations
Minor None
693 Protection Mechanism Failure
Major Mapping_Notes
Minor None
756 Missing Custom Error Page
Major Observed_Examples
Minor None
761 Free of Pointer not at Start of Buffer
Major Detection_Factors
Minor None
762 Mismatched Memory Management Routines
Major Detection_Factors
Minor None
763 Release of Invalid Pointer or Reference
Major Detection_Factors, Potential_Mitigations
Minor None
787 Out-of-bounds Write
Major Mapping_Notes
Minor None
789 Memory Allocation with Excessive Size Value
Major Observed_Examples
Minor None
835 Loop with Unreachable Exit Condition ('Infinite Loop')
Major Observed_Examples
Minor None
840 Business Logic Errors
Major Mapping_Notes
Minor None
862 Missing Authorization
Major Applicable_Platforms, Observed_Examples, Relationships
Minor None
918 Server-Side Request Forgery (SSRF)
Major Applicable_Platforms, Observed_Examples, References, Relationships
Minor None
925 Improper Verification of Intent by Broadcast Receiver
Major Observed_Examples
Minor None
940 Improper Verification of Source of a Communication Channel
Major Observed_Examples
Minor None
1004 Sensitive Cookie Without 'HttpOnly' Flag
Major Background_Details, Description, Diagram
Minor Potential_Mitigations
1021 Improper Restriction of Rendered UI Layers or Frames
Major Common_Consequences, Description, Diagram, Potential_Mitigations
Minor None
1023 Incomplete Comparison with Missing Factors
Major Detection_Factors, Potential_Mitigations
Minor None
1024 Comparison of Incompatible Types
Major Detection_Factors, Potential_Mitigations
Minor None
1025 Comparison Using Wrong Factors
Major Detection_Factors, Potential_Mitigations
Minor None
1039 Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
Major Observed_Examples, Relationships
Minor None
1069 Empty Exception Block
Major Mapping_Notes
Minor None
1078 Inappropriate Source Code Style or Formatting
Major Detection_Factors
Minor None
1088 Synchronous Access of Remote Resource without Timeout
Major Observed_Examples
Minor None
1102 Reliance on Machine-Dependent Data Representation
Major Observed_Examples
Minor None
1104 Use of Unmaintained Third Party Components
Major Observed_Examples
Minor None
1177 Use of Prohibited Code
Major Potential_Mitigations, References
Minor None
1268 Policy Privileges are not Assigned Consistently Between Control and Data Agents
Major Demonstrative_Examples
Minor None
1275 Sensitive Cookie with Improper SameSite Attribute
Major None
Minor Potential_Mitigations
1284 Improper Validation of Specified Quantity in Input
Major Demonstrative_Examples, Observed_Examples
Minor None
1295 Debug Messages Revealing Unnecessary Information
Major Observed_Examples
Minor None
1327 Binding to an Unrestricted IP Address
Major Observed_Examples
Minor None
1329 Reliance on Component That is Not Updateable
Major Observed_Examples
Minor None
1333 Inefficient Regular Expression Complexity
Major Background_Details, Common_Consequences, Description, Diagram, Modes_of_Introduction
Minor None
1335 Incorrect Bitwise Shift of Integer
Major Observed_Examples
Minor None
1336 Improper Neutralization of Special Elements Used in a Template Engine
Major Relationships
Minor None
1357 Reliance on Insufficiently Trustworthy Component
Major Relationships
Minor None
1386 Insecure Operation on Windows Junction / Mount Point
Major Description
Minor None
1395 Dependency on Vulnerable Third-Party Component
Major Description, Relationships
Minor None
1426 Improper Validation of Generative AI Output
Major Relationships
Minor None
1427 Improper Neutralization of Input Used for LLM Prompting
Major Relationships
Minor None
1434 Insecure Setting of Generative AI/ML Model Inference Parameters
Major Relationships
Minor None
Page Last Updated: April 30, 2026