Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-74 (输出中的特殊元素转义处理不恰当(注入)) — Vulnerability Class 375

375 vulnerabilities classified as CWE-74 (输出中的特殊元素转义处理不恰当(注入)). AI Chinese analysis included.

CWE-74 represents a critical input validation weakness where software constructs commands, data structures, or records using externally influenced input without properly neutralizing special elements. This flaw allows attackers to inject malicious syntax that alters the intended interpretation of the downstream component, leading to severe consequences such as unauthorized command execution, data manipulation, or system compromise. Exploitation typically occurs when user-supplied data is directly concatenated into queries or system calls without sanitization. To prevent this, developers must implement rigorous input validation, ensuring all external data is strictly checked against expected formats. Furthermore, utilizing parameterized queries, safe APIs, and context-specific encoding techniques ensures that special characters are treated as literal data rather than executable instructions, effectively neutralizing potential injection vectors before they reach the downstream processor.

MITRE CWE Description
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Common Consequences (5)
ConfidentialityRead Application Data
Many injection attacks involve the disclosure of important information -- in terms of both data sensitivity and usefulness in further exploitation.
Access ControlBypass Protection Mechanism
In some cases, injectable code controls authentication; this may lead to a remote vulnerability.
OtherAlter Execution Logic
Injection attacks are characterized by the ability to significantly change the flow of a given process, and in some cases, to the execution of arbitrary code.
Integrity, OtherOther
Data injection attacks lead to loss of data integrity in nearly all cases as the control-plane data injected is always incidental to data recall or writing.
Non-RepudiationHide Activities
Often the actions performed by injected control code are unlogged.
Mitigations (2)
RequirementsProgramming languages and supporting technologies might be chosen which are not subject to these issues.
ImplementationUtilize an appropriate mix of allowlist and denylist parsing to filter control-plane syntax from all input.
Examples (2)
This example code intends to take the name of a user and list the contents of that user's home directory. It is subject to the first variant of OS command injection.
$userName = $_POST["user"]; $command = 'ls -l /home/' . $userName; system($command);
Bad · PHP
;rm -rf /
Attack
The following code segment reads the name of the author of a weblog entry, author, from an HTTP request and sets it in a cookie header of an HTTP response.
String author = request.getParameter(AUTHOR_PARAM); ... Cookie cookie = new Cookie("author", author); cookie.setMaxAge(cookieExpiration); response.addCookie(cookie);
Bad · Java
HTTP/1.1 200 OK ... Set-Cookie: author=Jane Smith ...
Result
CVE IDTitleCVSSSeverityPublished
CVE-2024-42472 Flatpak may allow access to files outside sandbox for certain apps — flatpak 10.0 Critical2024-08-15
CVE-2024-42489 Pro Macros Remote Code Execution via Viewpdf and similar macros — xwiki-pro-macros 10.0 Critical2024-08-12
CVE-2024-6331 Injection by Prompt Injection in stitionai/devika — stitionai/devika 7.5 High2024-08-04
CVE-2024-41127 Monkeytype is vulnerable to Poisoned Pipeline Execution through Code Injection in its `ci-failure-comment.yml` GitHub Workflow, enabling attackers to gain `pull-requests` write access. — monkeytype 8.4 High2024-08-02
CVE-2024-39320 Discourse allows iframe injection though default site setting — discourse 6.1 Medium2024-07-30
CVE-2024-26020 Ankitects Anki 注入漏洞 — Anki 9.6 Critical2024-07-22
CVE-2024-41122 Custom environment variables allow to alter execution flow of plugins in Woodpecker — woodpecker 7.5 High2024-07-19
CVE-2024-41121 Custom workspace allow to overwrite plugin entrypoint executable in Woodpecker — woodpecker 8.8 High2024-07-19
CVE-2024-39906 Remote code execution in Haven IndieAuthClient (GHSL-2024-093) — haven 8.4 High2024-07-19
CVE-2024-41111 BishopFox Sliver Authenticated Remote Code Execution — sliver 7.2 High2024-07-18
CVE-2024-20429 Cisco Secure Email 安全漏洞 — Cisco Secure Email 6.5 Medium2024-07-17
CVE-2024-40637 Implicit override for built-in materializations from installed packages in dbt-core — dbt-core 4.2 Medium2024-07-16
CVE-2024-38700 WordPress WPCS – WordPress Currency Switcher Professional plugin <= 1.2.0.3 - Arbitrary Shortcode Execution vulnerability — WPCS 6.5 Medium2024-07-12
CVE-2024-36522 Apache Wicket: Remote code execution via XSLT injection — Apache Wicket 9.8AICriticalAI2024-07-12
CVE-2024-37442 WordPress Photo Gallery by Ays – Responsive Image Gallery plugin < 5.7.1 - HTML Injection vulnerability — Photo Gallery by Ays 3.8 Low2024-07-09
CVE-2024-37253 WordPress WPDirectoryKit plugin <= 1.3.6 - HTML Injection vulnerability — WP Directory Kit 2.7 Low2024-07-09
CVE-2024-35777 WordPress WooCommerce plugin <= 8.9.2 - Content Injection vulnerability — WooCommerce 3.5 Low2024-07-09
CVE-2024-6470 playSMS Template injection — playSMS 2.7 Low2024-07-03
CVE-2024-6469 playSMS Template injection — playSMS 2.7 Low2024-07-03
CVE-2024-38366 CoacoaPods trunk RCE in email verification system rfc-822 — CocoaPods 10.0 Critical2024-07-01
CVE-2024-36420 GHSL-2023-232: Flowise Path Injection at /api/v1/openai-assistants-file — Flowise 7.5 High2024-07-01
CVE-2024-35728 WordPress Product Addons & Fields for WooCommerce plugin <= 32.0.20 - Content Injection vulnerability — PPOM for WooCommerce 5.3 Medium2024-06-10
CVE-2024-5184 Prompt Injection in EmailGPT — EmailGPT 6.5 Medium2024-06-05
CVE-2023-23738 WordPress Spectra – WordPress Gutenberg Blocks plugin <= 2.3.0 - Unauthenticated Email Spoofing Vulnerability — Spectra 5.3 Medium2024-06-03
CVE-2024-34697 Freescout vulnerable to Stored HTML Injection in Editing Received Emails — freescout 7.6 High2024-05-13
CVE-2024-32986 Arbitrary code execution due to improper sanitization of web app properties in PWAsForFirefox — PWAsForFirefox 9.7 Critical2024-05-03
CVE-2024-34062 tqdm CLI arguments injection attack — tqdm 4.8 Medium2024-05-03
CVE-2024-28234 Contao has insufficient BBCode sanitizer — contao 4.3 Medium2024-04-09
CVE-2024-28191 Contao may have unencoded insert tags in the frontend — contao 3.1 Low2024-04-09
CVE-2024-3366 Xuxueli xxl-job Template JdkSerializeTool.java deserialize injection — xxl-job 3.5 Low2024-04-06

Vulnerabilities classified as CWE-74 (输出中的特殊元素转义处理不恰当(注入)) represent 375 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.