Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-683 (使用不正确参数次序的函数调用) — Vulnerability Class 3

3 vulnerabilities classified as CWE-683 (使用不正确参数次序的函数调用). AI Chinese analysis included.

CWE-683 represents a logic error where a software component invokes a function or procedure but supplies its arguments in an incorrect sequence. This misordering typically leads to unexpected behavior, data corruption, or application crashes, as the callee interprets the parameters based on their defined signature rather than the caller’s intent. Exploitation often occurs in languages with loose typing or variable argument lists, such as C, where format string vulnerabilities may arise if string and integer arguments are swapped. Developers mitigate this risk by strictly adhering to function signatures, utilizing static analysis tools to detect argument mismatches during compilation, and employing type-safe languages that enforce parameter order at compile time. Rigorous code reviews and automated testing further ensure that argument sequences align with the expected interface, preventing logical flaws from reaching production environments.

MITRE CWE Description
The product calls a function, procedure, or routine, but the caller specifies the arguments in an incorrect order, leading to resultant weaknesses. While this weakness might be caught by the compiler in some languages, it can occur more frequently in cases in which the called function accepts variable numbers or types of arguments, such as format strings in C. It also can occur in languages or environments that do not enforce strong typing.
Common Consequences (1)
OtherQuality Degradation
Mitigations (1)
ImplementationUse the function, procedure, or routine as specified.
Examples (1)
The following PHP method authenticates a user given a username/password combination but is called with the parameters in reverse order.
function authenticate($username, $password) { // authenticate user ... } authenticate($_POST['password'], $_POST['username']);
Bad · PHP

Vulnerabilities classified as CWE-683 (使用不正确参数次序的函数调用) represent 3 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.