Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-1173 (验证框架使用不当) — Vulnerability Class 5

5 vulnerabilities classified as CWE-1173 (验证框架使用不当). AI Chinese analysis included.

CWE-1173 represents a design weakness where developers fail to leverage built-in or third-party input validation frameworks, opting instead for manual, error-prone checks. This oversight typically leads to vulnerabilities such as injection attacks or buffer overflows, as attackers exploit inconsistent or incomplete validation logic to bypass security controls. By ignoring standardized frameworks, applications lack robust, automated safeguards against malformed or malicious inputs, increasing the attack surface significantly. To mitigate this risk, developers should integrate established validation libraries that enforce strict schema compliance and automatically sanitize data. Utilizing these tools ensures consistent application of security rules across all input vectors, reducing human error and enhancing overall system resilience against common exploitation techniques.

MITRE CWE Description
The product does not use, or incorrectly uses, an input validation framework that is provided by the source language or an independent library. Many modern coding languages provide developers with input validation frameworks to make the task of input validation easier and less error-prone. These frameworks will automatically check all input against specified criteria and direct execution to error handlers when invalid input is received. The improper use (i.e., an incorrect implementation or missing altogether) of these frameworks is not directly exploitable, but can lead to an exploitable condition if proper input validation is not performed later in the product. Not using provided input validation frameworks can also hurt the maintainability of code as future developers may not recognize the downstream input validation being used in the place of the validation framework.
Common Consequences (1)
IntegrityUnexpected State
Unchecked input leads to cross-site scripting, process control, and SQL injection vulnerabilities, among others.
Mitigations (1)
ImplementationProperly use provided input validation frameworks.
CVE IDTitleCVSSSeverityPublished
CVE-2026-33674 PrestaShop: Improper Use of Validation Framework — PrestaShop 2.0 Low2026-03-26
CVE-2025-3940 Improper Use of Validation Framework — Niagara Framework 5.3 Medium2025-05-22
CVE-2023-30949 CVE-2023-30949 — com.palantir.slate:slate 4.3 Medium2023-07-26
CVE-2022-1414 Red Hat 3scale 输入验证错误漏洞 — 3scale-amp-system 8.8 -2022-10-19
CVE-2020-1640 Junos OS: Receipt of certain genuine BGP packets from any BGP Speaker causes RPD to crash. — Junos OS 7.5 High2020-07-17

Vulnerabilities classified as CWE-1173 (验证框架使用不当) represent 5 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.