Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-940 (通信信道源的不正确验证) — Vulnerability Class 31

31 vulnerabilities classified as CWE-940 (通信信道源的不正确验证). AI Chinese analysis included.

CWE-940 represents a critical input validation weakness where software fails to authenticate the origin of an incoming communication channel. This flaw typically arises when applications accept connections or requests without verifying that they originate from a trusted, expected source. Attackers exploit this by establishing unauthorized channels from untrusted entities, effectively bypassing access controls to gain elevated privileges or trigger unintended functionality. To mitigate this risk, developers must implement rigorous source verification mechanisms, such as validating IP addresses, enforcing strict authentication protocols, and utilizing secure channel establishment procedures. By ensuring that every incoming connection is authenticated against a whitelist of known, trusted origins, organizations can prevent unauthorized actors from hijacking communication pathways and compromising system integrity.

MITRE CWE Description
The product establishes a communication channel to handle an incoming request that has been initiated by an actor, but it does not properly verify that the request is coming from the expected origin. When an attacker can successfully establish a communication channel from an untrusted origin, the attacker may be able to gain privileges and access unexpected functionality.
Common Consequences (1)
Access Control, OtherGain Privileges or Assume Identity, Varies by Context, Bypass Protection Mechanism
An attacker can access any functionality that is inadvertently accessible to the source.
Mitigations (1)
Architecture and DesignUse a mechanism that can validate the identity of the source, such as a certificate, and validate the integrity of data to ensure that it cannot be modified in transit using an Adversary-in-the-Middle (AITM) attack. When designing functionality of actions in the URL scheme, consider whether the action should be accessible to all mobile applications, or if an allowlist of applications to interface …
Examples (2)
This Android application will remove a user account when it receives an intent to do so:
IntentFilter filter = new IntentFilter("com.example.RemoveUser"); MyReceiver receiver = new MyReceiver(); registerReceiver(receiver, filter); public class DeleteReceiver extends BroadcastReceiver { @Override public void onReceive(Context context, Intent intent) { int userID = intent.getIntExtra("userID"); destroyUserData(userID); } }
Bad · Java
These Android and iOS applications intercept URL loading within a WebView and perform special actions if a particular URL scheme is used, thus allowing the Javascript within the WebView to communicate with the application:
// Android @Override public boolean shouldOverrideUrlLoading(WebView view, String url){ if (url.substring(0,14).equalsIgnoreCase("examplescheme:")){ if(url.substring(14,25).equalsIgnoreCase("getUserInfo")){ writeDataToView(view, UserData); return false; } else{ return true; } } }
Bad · Java
// iOS -(BOOL) webView:(UIWebView *)exWebView shouldStartLoadWithRequest:(NSURLRequest *)exRequest navigationType:(UIWebViewNavigationType)exNavigationType { NSURL *URL = [exRequest URL]; if ([[URL scheme] isEqualToString:@"exampleScheme"]) { NSString *functionString = [URL resourceSpecifier]; if ([functionString hasPrefix:@"specialFunction"]) { // Make data available back in webview. UIWebView *webView = [self writeDataToView:[URL query]]; } return NO; } return YES; }
Bad · Objective-C
CVE IDTitleCVSSSeverityPublished
CVE-2026-40434 Anviz CrossChex Standard Improper Verification of Source of a Communication Channel — Anviz CrossChex Standard 8.1 High2026-04-17
CVE-2026-35643 OpenClaw < 2026.3.22 - Arbitrary Code Execution via Unvalidated WebView JavascriptInterface — OpenClaw 8.8 High2026-04-10
CVE-2026-33875 Authenticator Vulnerable to Authentication Flow Hijack — app-Authenticator 9.3 Critical2026-03-27
CVE-2019-25613 Easy Chat Server 3.1 Denial of Service via message Parameter — Easy Chat 7.5 High2026-03-22
CVE-2026-2967 Cesanta Mongoose TCP Sequence Number net_builtin.c getpeer verification of source — Mongoose 3.7 Low2026-02-23
CVE-2026-22269 Dell PowerProtect Data Manager 安全漏洞 — PowerProtect Data Manager 4.7 Medium2026-02-19
CVE-2025-62439 Fortinet FortiOS 安全漏洞 — FortiOS 3.8 Medium2026-02-10
CVE-2025-40820 Siemens多款产品 安全漏洞 — SIDOOR ATD430W 7.5 High2025-12-09
CVE-2025-13086 OpenVPN 安全漏洞 — OpenVPN 7.5AIHighAI2025-12-03
CVE-2025-61932 MOTEX Lanscope Endpoint Manager 安全漏洞 — Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) 9.8AICriticalAI2025-10-20
CVE-2025-20365 Cisco Access Point Software 安全漏洞 — Cisco Aironet Access Point Software (IOS XE Controller) 4.3 Medium2025-09-24
CVE-2025-9999 Improper validation of payload elements — PcVue 9.8AICriticalAI2025-09-05
CVE-2025-42978 Insufficiently Secure Hostname Verification for Outbound TLS Connections in SAP NetWeaver Application Server Java — SAP NetWeaver Application Server Java 3.5 Low2025-07-08
CVE-2025-25305 SSL validation for outgoing requests in Home Assistant Core and used libs not correct — core 7.0 High2025-02-18
CVE-2025-23222 dde-api-proxy 安全漏洞 — dde-api-proxy 8.4 High2025-01-24
CVE-2024-7322 Dos in ZigBee device due to unsolicited encrypted rejoin response — EmberZNet 5.8 Medium2025-01-15
CVE-2024-36506 Fortinet FortiClientEMS 安全漏洞 — FortiClientEMS 3.5 Low2025-01-14
CVE-2025-23019 IPv6-in-IPv4 tunneling 安全漏洞 — IPv6 5.4 Medium2025-01-14
CVE-2025-23018 IPv6-in-IPv4 tunneling 安全漏洞 — IPv6 5.4 Medium2025-01-14
CVE-2024-49579 JetBrains YouTrack 安全漏洞 — YouTrack 8.1 High2024-10-17
CVE-2024-20390 Cisco IOS XR Software Dedicated XML Agent TCP Denial of Service Vulnerability — Cisco IOS XR Software 5.3 Medium2024-09-11
CVE-2024-1621 uniFLOW Online device registration susceptible to compromise — uniFLOW Online 9.8AICriticalAI2024-09-02
CVE-2024-0009 PAN-OS: Improper IP Address Verification in GlobalProtect Gateway — PAN-OS 6.3 Medium2024-02-14
CVE-2023-51440 Siemens SIMATIC 安全漏洞 — SIMATIC CP 343-1 7.5 High2024-02-13
CVE-2023-48387 TAIWAN-CA(TWCA) JCICSecurityTool - Improper Input Validation — JCICSecurityTool 8.8 High2023-12-15
CVE-2023-41355 Chunghwa Telecom NOKIA G-040W-Q - Improper Input Validation — NOKIA G-040W-Q 9.8 Critical2023-11-03
CVE-2023-41094 Touchlink authentication bypass due to packets processed after timeout or out of range in Ember ZNet — Ember ZNet 10.0 Critical2023-10-04
CVE-2023-3663 CODESYS: Missing integrity check in CODESYS Development System — CODESYS Development System 8.8 High2023-08-03
CVE-2022-4848 Improper Verification of Source of a Communication Channel in usememos/memos — usememos/memos 6.5 -2022-12-29
CVE-2022-4800 Improper Verification of Source of a Communication Channel in usememos/memos — usememos/memos 6.5 -2022-12-28

Vulnerabilities classified as CWE-940 (通信信道源的不正确验证) represent 31 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.