Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-692 — Vulnerability Class 2

2 vulnerabilities classified as CWE-692. AI Chinese analysis included.

CWE-692 represents a critical input validation weakness where developers rely on an incomplete denylist to mitigate Cross-Site Scripting (XSS) attacks. This flaw occurs when security controls attempt to block malicious payloads by filtering out known bad characters or tags, yet fail to account for the vast array of encoding techniques, browser-specific parsing quirks, and contextual variations that attackers exploit. Consequently, adversaries can bypass these rudimentary filters by using alternative syntaxes or obfuscation methods that were not explicitly listed in the exclusion rules. To avoid this vulnerability, security engineers must abandon restrictive denylists in favor of robust allowlist strategies or context-aware output encoding. By strictly defining acceptable input formats and ensuring data is properly escaped based on its specific context within the HTML structure, developers can effectively neutralize XSS threats regardless of the attacker’s evasion techniques.

MITRE CWE Description
The product uses a denylist-based protection mechanism to defend against XSS attacks, but the denylist is incomplete, allowing XSS variants to succeed. While XSS might seem simple to prevent, web browsers vary so widely in how they parse web pages, that a denylist cannot keep track of all the variations. The "XSS Cheat Sheet" [REF-714] contains a large number of attacks that are intended to bypass incomplete denylists.
Common Consequences (1)
Confidentiality, Integrity, AvailabilityExecute Unauthorized Code or Commands
CVE IDTitleCVSSSeverityPublished
CVE-2025-20240 Cisco IOS XE Software 安全漏洞 — Cisco IOS XE Software 6.1 Medium2025-09-24
CVE-2025-49590 CryptPad Dom-Based Cross-Site Scripting (XSS) Vulnerability — cryptpad 6.1AIMediumAI2025-06-18

Vulnerabilities classified as CWE-692 represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.