Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-494 (下载代码缺少完整性检查) — Vulnerability Class 101

101 vulnerabilities classified as CWE-494 (下载代码缺少完整性检查). AI Chinese analysis included.

CWE-494 represents a critical integrity verification weakness where software retrieves and executes code from remote sources without adequately validating its origin or authenticity. This vulnerability is typically exploited by attackers who compromise the distribution server, manipulate DNS records to redirect requests to malicious hosts, or intercept and alter the code during transit via man-in-the-middle attacks. Consequently, the application unknowingly runs compromised payloads, leading to full system takeover or data exfiltration. To mitigate this risk, developers must implement robust cryptographic verification mechanisms, such as digital signatures or checksums, ensuring that downloaded artifacts match their expected values. Additionally, utilizing secure transport protocols like HTTPS and maintaining strict certificate validation further prevents tampering, thereby guaranteeing that only trusted, unmodified code is executed within the application environment.

MITRE CWE Description
The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code. An attacker can execute malicious code by compromising the host server, performing DNS spoofing, or modifying the code in transit.
Common Consequences (1)
Integrity, Availability, Confidentiality, OtherExecute Unauthorized Code or Commands, Alter Execution Logic, Other
Executing untrusted code could compromise the control flow of the program. The untrusted code could execute attacker-controlled commands, read or modify sensitive resources, or prevent the software from functioning correctly for legitimate users.
Mitigations (5)
ImplementationPerform proper forward and reverse DNS lookups to detect DNS spoofing.
Architecture and Design, OperationEncrypt the code with a reliable encryption scheme before transmitting. This will only be a partial solution, since it will not detect DNS spoofing and it will not prevent your code from being modified on the hosting site.
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482]. Speficially, it may be helpful to use tools or frameworks to perform integrity checking on the transmitted code. When providing the code that is to be downloaded, such as for automatic updates of the software, then use cryptographic signatures for …
Architecture and Design, OperationRun your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database ad…
Architecture and Design, OperationRun the code in a "jail" or similar sandbox environment that enforces strict boundaries between the process and the operating system. This may effectively restrict which files can be accessed in a particular directory or which commands can be executed by the software. OS-level examples include the Unix chroot jail, AppArmor, and SELinux. In general, managed code may provide some protection. For ex…
Effectiveness: Limited
Examples (2)
This example loads an external class from a local subdirectory.
URL[] classURLs= new URL[]{ new URL("file:subdir/") }; URLClassLoader loader = new URLClassLoader(classURLs); Class loadedClass = Class.forName("loadMe", true, loader);
Bad · Java
This code includes an external script to get database credentials, then authenticates a user against the database, allowing access to the application.
//assume the password is already encrypted, avoiding CWE-312 function authenticate($username,$password){ include("http://external.example.com/dbInfo.php"); //dbInfo.php makes $dbhost, $dbuser, $dbpass, $dbname available mysql_connect($dbhost, $dbuser, $dbpass) or die ('Error connecting to mysql'); mysql_select_db($dbname); $query = 'Select * from users where username='.$username.' And password='.$password; $result = mysql_query($query); if(mysql_numrows($result) == 1){ mysql_close(); return true; } else{ mysql_close(); return false; } }
Bad · PHP
CVE IDTitleCVSSSeverityPublished
CVE-2026-42249 Remote Code Execution in Ollama via Update Mechanism — Ollama 8.8AIHighAI2026-04-29
CVE-2026-42248 Missing Signature Verification for Updates in Ollama — Ollama 8.4AIHighAI2026-04-29
CVE-2026-40066 Anviz Products Download of Code Without Integrity Check — Anviz CX7 Firmware 8.8 High2026-04-17
CVE-2026-3428 ASUS Member Center 安全漏洞 — Member Center(华硕大厅) 7.0AIHighAI2026-04-16
CVE-2026-34841 Axios npm Supply Chain Incident Impacting @usebruno/cli — bruno 9.8 Critical2026-04-06
CVE-2026-3502 TrueConf Client Update Integrity Verification Bypass — TrueConf Client 7.8 High2026-03-30
CVE-2026-33075 FastGPT has Arbitrary Code Execution in GitHub Actions via pull_request_target in fastgpt-preview-image.yml — FastGPT 7.5 -2026-03-20
CVE-2026-1878 ASUS ROG peripheral driver 安全漏洞 — Driver( Keyboard & Mouse ) 7.4AIHighAI2026-03-12
CVE-2026-3000 Changing|IDExpert Windows Logon Agent - Remote Code Execution — IDExpert Windows Logon Agent 9.8 Critical2026-03-02
CVE-2026-2999 Changing|IDExpert Windows Logon Agent - Remote Code Execution — IDExpert Windows Logon Agent 9.8 Critical2026-03-02
CVE-2025-47904 Unsigned upgrade package — Time Provider 4100 9.1AICriticalAI2026-02-24
CVE-2026-27180 MajorDoMo Supply Chain Remote Code Execution via Update URL Poisoning — MajorDoMo 9.8 Critical2026-02-18
CVE-2025-15575 Missing Firmware Authenticity Checks in Solax Power Pocket WiFi models — Pocket WiFi 3.0 4.3AIMediumAI2026-02-12
CVE-2026-20056 Cisco Secure Web Appliance TBD Bypass Vulnerability — Cisco Secure Web Appliance 4.0 Medium2026-02-04
CVE-2025-15556 Notepad++ < 8.8.9 WinGUp Updater Lacks Update Integrity Verification — notepad-plus-plus 7.0AIHighAI2026-02-03
CVE-2026-22865 Gradle's failure to disable repositories failing to answer can expose builds to malicious artifacts — gradle 5.3 -2026-01-16
CVE-2025-69263 pnpm Lockfile Integrity Bypass Allows Remote Dynamic Dependencies — pnpm 7.5 High2026-01-07
CVE-2025-14265 Improper server-side validation in ScreenConnect extension framework — ScreenConnect 9.1 Critical2025-12-11
CVE-2025-66334 Huawei HarmonyOS 安全漏洞 — HarmonyOS 3.3 Low2025-12-08
CVE-2025-66333 Huawei HarmonyOS 安全漏洞 — HarmonyOS 3.3 Low2025-12-08
CVE-2025-66332 Huawei HarmonyOS 安全漏洞 — HarmonyOS 3.3 Low2025-12-08
CVE-2025-66331 Huawei HarmonyOS 安全漏洞 — HarmonyOS 3.3 Low2025-12-08
CVE-2025-40604 SonicWALL Email Security 安全漏洞 — Email Security 6.7 -2025-11-20
CVE-2025-11493 Self-Update Verification Mechanism Process in ConnectWise Automate — Automate 8.8 High2025-10-16
CVE-2025-34212 Vasion Print (formerly PrinterLogic) Insecure Build Pipeline — Print Virtual Appliance Host 8.1AIHighAI2025-09-29
CVE-2025-9319 Lenovo Wallpaper Client 安全漏洞 — Wallpaper Client 7.5 High2025-09-11
CVE-2025-30199 ECOVACS Vacuum and Base Station accept unsigned firmware — DEEBOT X1 Series 7.2 High2025-09-05
CVE-2025-35115 Agiloft insecure download of system packages — Agiloft 8.1 High2025-08-26
CVE-2025-31355 Tenda AC6 安全漏洞 — AC6 V5.0 7.2 High2025-08-20
CVE-2025-53520 EG4 Electronics EG4 Inverters Download of Code Without Integrity Check — EG4 12kPV 8.8 High2025-08-08

Vulnerabilities classified as CWE-494 (下载代码缺少完整性检查) represent 101 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.