Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-74 (输出中的特殊元素转义处理不恰当(注入)) — Vulnerability Class 375

375 vulnerabilities classified as CWE-74 (输出中的特殊元素转义处理不恰当(注入)). AI Chinese analysis included.

CWE-74 represents a critical input validation weakness where software constructs commands, data structures, or records using externally influenced input without properly neutralizing special elements. This flaw allows attackers to inject malicious syntax that alters the intended interpretation of the downstream component, leading to severe consequences such as unauthorized command execution, data manipulation, or system compromise. Exploitation typically occurs when user-supplied data is directly concatenated into queries or system calls without sanitization. To prevent this, developers must implement rigorous input validation, ensuring all external data is strictly checked against expected formats. Furthermore, utilizing parameterized queries, safe APIs, and context-specific encoding techniques ensures that special characters are treated as literal data rather than executable instructions, effectively neutralizing potential injection vectors before they reach the downstream processor.

MITRE CWE Description
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Common Consequences (5)
ConfidentialityRead Application Data
Many injection attacks involve the disclosure of important information -- in terms of both data sensitivity and usefulness in further exploitation.
Access ControlBypass Protection Mechanism
In some cases, injectable code controls authentication; this may lead to a remote vulnerability.
OtherAlter Execution Logic
Injection attacks are characterized by the ability to significantly change the flow of a given process, and in some cases, to the execution of arbitrary code.
Integrity, OtherOther
Data injection attacks lead to loss of data integrity in nearly all cases as the control-plane data injected is always incidental to data recall or writing.
Non-RepudiationHide Activities
Often the actions performed by injected control code are unlogged.
Mitigations (2)
RequirementsProgramming languages and supporting technologies might be chosen which are not subject to these issues.
ImplementationUtilize an appropriate mix of allowlist and denylist parsing to filter control-plane syntax from all input.
Examples (2)
This example code intends to take the name of a user and list the contents of that user's home directory. It is subject to the first variant of OS command injection.
$userName = $_POST["user"]; $command = 'ls -l /home/' . $userName; system($command);
Bad · PHP
;rm -rf /
Attack
The following code segment reads the name of the author of a weblog entry, author, from an HTTP request and sets it in a cookie header of an HTTP response.
String author = request.getParameter(AUTHOR_PARAM); ... Cookie cookie = new Cookie("author", author); cookie.setMaxAge(cookieExpiration); response.addCookie(cookie);
Bad · Java
HTTP/1.1 200 OK ... Set-Cookie: author=Jane Smith ...
Result
CVE IDTitleCVSSSeverityPublished
CVE-2025-1691 MongoDB Shell may be susceptible to Control Character Injection via autocomplete — mongosh 7.6 High2025-02-27
CVE-2025-1611 ShopXO Template ThemeAdminService.php injection — ShopXO 4.7 Medium2025-02-24
CVE-2022-31631 PDO::quote() may return unquoted string — PHP 9.1 Critical2025-02-12
CVE-2025-24962 Command Injection in reNgine — rengine 8.8 -2025-02-03
CVE-2025-24374 Twig fixes a security issue where escaping was missing when using null coalesce operator (??) — Twig 4.3 Medium2025-01-29
CVE-2025-24364 vaultwarden allows RCE in the admin panel — vaultwarden 7.2 High2025-01-27
CVE-2025-0697 Telstra Smart Modem Gen 2 HTTP Header injection — Smart Modem Gen 2 5.3 Medium2025-01-24
CVE-2024-53263 Git LFS permits exfiltration of credentials via crafted HTTP URLs — git-lfs 7.5 -2025-01-14
CVE-2024-21797 WAVLINK AC3000 注入漏洞 — Wavlink AC3000 9.1 Critical2025-01-14
CVE-2024-39604 WAVLINK AC3000 注入漏洞 — Wavlink AC3000 9.0 Critical2025-01-14
CVE-2024-34544 WAVLINK AC3000 注入漏洞 — Wavlink AC3000 9.1 Critical2025-01-14
CVE-2024-36295 WAVLINK AC3000 注入漏洞 — Wavlink AC3000 9.1 Critical2025-01-14
CVE-2024-39785 WAVLINK AC3000 注入漏洞 — Wavlink AC3000 9.1 Critical2025-01-14
CVE-2024-39784 WAVLINK AC3000 注入漏洞 — Wavlink AC3000 9.1 Critical2025-01-14
CVE-2024-53860 Potential Abuse for Sending Arbitrary Emails in sp-php-email-handler — SPEmailHandler-PHP 8.6 High2024-11-27
CVE-2024-50572 Siemens多款产品 注入漏洞 — RUGGEDCOM RM1224 LTE(4G) EU 7.2 High2024-11-12
CVE-2024-52004 Remote code execution vulnerabilities in MediaCMS — mediacms 9.8 -2024-11-08
CVE-2024-50340 Ability to change environment from query in symfony/runtime — symfony 7.3 High2024-11-06
CVE-2024-10491 Preload arbitrary resources by injecting additional `Link` headers — express 4.0 Medium2024-10-29
CVE-2024-49381 Plenti arbitrary file deletion vulnerability — plenti 8.1 -2024-10-25
CVE-2024-49380 Plenti arbitrary file write vulnerability — plenti 8.8 -2024-10-25
CVE-2024-48927 Potential Code Execution Risk When Viewing SVG Files in Full Screen in Backoffice — Umbraco-CMS 4.6 Medium2024-10-22
CVE-2024-47764 cookie accepts cookie name, path, and domain with out of bounds characters — cookie 5.3 -2024-10-04
CVE-2024-47180 Shields.io Remote Code Execution vulnerability in Dynamic JSON/TOML/YAML badges — shields 8.8 High2024-09-26
CVE-2024-46997 DataEase's H2 datasource has a remote command execution risk — dataease 9.8 Critical2024-09-23
CVE-2024-46983 Remote Command Execution(RCE) Vulnerbility in sofa-hessian — sofa-hessian 9.8 Critical2024-09-19
CVE-2024-46986 Arbitrary file write leading to RCE in Camaleon CMS — camaleon-cms 10.0 Critical2024-09-18
CVE-2024-6702 Pegasystem PEGA Platform 安全漏洞 — Pega Infinity 5.2 Medium2024-09-12
CVE-2024-8367 HM Courts & Tribunals Service Probate Back Office Markdown NotificationService.java injection — Probate Back Office 3.5 Low2024-09-01
CVE-2024-43782 openedx-translations's Atlas translations for Open edX missing validation — openedx-translations 7.7 High2024-08-23

Vulnerabilities classified as CWE-74 (输出中的特殊元素转义处理不恰当(注入)) represent 375 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.