2025 CWE Top 25 Key InsightsThe “2025 CWE Top 25 Most Dangerous Software Weaknesses” highlights the most severe and prevalent weaknesses behind the 39,080 Common Vulnerabilities and Exposures (CVE™) Records in this year’s dataset. Uncovering the technical root causes of these vulnerabilities serves as a powerful guide for investments, policies, and practices to prevent these vulnerabilities from occurring in the first place. The CWE Top 25 can help inform:
The 2025 CWE Top 25 is a valuable resource for developers and security professionals, as well as a strategic guide for organizations aiming to make informed decisions in software, security, and risk management investments. AnalysisWhile CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-Site Scripting’) retains its spot at the top of the Top 25, there were many changes in rankings from last year’s list. The biggest movers up the list are:
New entries in the Top 25 are:
Four CWEs were not ranked in 2024 and earlier because of how previous Top 25 calculations were handled. For more detailed information, see the Methodology page. In short, the 2025 CWE Top 25 used all CWE mappings as provided and reviewed by CNAs, without normalizing them back to View-1003: Weaknesses for Simplified Mapping of Published Vulnerabilities, a simplified collection of 130 weaknesses commonly used by the U.S. National Vulnerability Database (NVD) for their enrichment purposes. As a result, the 2025 CWE Top 25 reflects a more accurate picture of real-world CWE mappings and offers greater insight into the CWE root cause mapping practices of the broader vulnerability management community. The biggest downward movers are:
Entries that fell off the Top 25 are:
Most of these downward-moving CWEs (except CWE-190 and CWE-918) may have had sharply reduced mappings because, in previous years, mappings to their child CWEs were rolled up to them due to View-1003 normalization. For example, CWE-269 had 219 CVEs in non-normalized data this year, while one of its children (CWE-250) was mapped by 88 CVEs. If all of CWE-269’s children had been normalized to CWE-269, it would have had 633 CVEs this year. This likely would have kept it in the Top 25. Notably, many of these CWEs are more abstract and Discouraged for mapping, which may have led CNAs to use more precise mappings. Mapping UsageEvery CWE on cwe.mitre.org is annotated with a “mapping usage recommendation” that suggests whether the CWE is recommended for vulnerability root cause mapping given its level of abstraction and actionability. These include Allowed, Allowed-with-Review, Discouraged, and Prohibited. The CWEs in the 2025 Top 25 received 28,336 total mappings and had the following mapping usage recommendations:
In contrast, last year’s 2024 Top 25 had the following mapping usage recommendations:
The decline in mappings to “Discouraged” CWEs suggests a marked improvement in root cause mapping practices, since other prior years have been in the 10% or 11% range. Even using data normalized to View-1003 as in past years, there was still a reduction. This is best illustrated by the removal of two Discouraged CWEs from the Top 25, namely CWE-119 and CWE-400. The Top 25 Team encourages CVE Numbering Authorities (CNAs) to continue striving for actionable and precise CWE mappings in their CVE Records. For more information about root cause mapping, see our CVE-to-CWE Root Cause Mapping Guidance. AbstractionCWE contains over 900 weaknesses that range from abstract and conceptual to precise and technology- or language-specific. A precise weakness will have a parent weakness that is more abstract, which may also have parent weaknesses, and so on. There are four types of weakness abstractions, from most abstract to most specific: Pillar, Class, Base, and Variant. For root cause mapping, CWE recommends that Base and Variant level CWEs should be used whenever possible to ensure providing adequate specificity and actionability. Class level CWEs may be used if there is no accurate Base or Variant level CWE. Pillar level weaknesses are rarely useful for root cause mapping, if ever, with some rare exceptions for unusual or less widely researched weaknesses. In the 2025 Top 25, the number of mappings based on CWE abstraction were:
The 5 classes in 2025’s Top 25 represent a decrease from 2024’s 9 classes. At least part of this decrease is due to the use of raw data, allowing lower-level CWEs to enter the Top 25. In 2024, the abstraction counts were:
It should be noted that the “Compound” CWE is for Cross-Site Request Forgery (CSRF) (i.e., CWE-352), which is a composite of multiple weaknesses; CWE-352’s abstraction aligns with that of a Base. Possible Causes of Rank ShiftsGiven the increase in annual CVE Records, there were unsurprisingly higher CVE counts for most CWEs in this year’s dataset analysis. The shift in scoring and the fewer CWE mappings in NVD data in 2024 also contributed to this. For example, the number of CVE Records that mapped to CWE-79 increased by over 3,000 this year, and CWE-89 by almost 1,000. As more CNAs contribute their own CWE mappings for CVE Records, it is possible that high-volume CNAs might have mapping practices that are different than what has been experienced before. A per-CNA evaluation of mapping practices could be informative, but it was outside the scope of this initial analysis. The Top 25 team is excited to see more and more CNAs routinely providing CWE mappings at the time of disclosure:
The CVE Program publishes regular metrics, including the CVE Numbering Authority (CNA) Enrichment Recognition List, which may be of interest to Top 25 readers. |