CWE Top 25 Most Dangerous Software Weaknesses (2024)
The 2024 CWE Top 25 Most Dangerous Software Weaknesses published by MITRE Corporation and supported by CISA. Based on analysis of 31,770 CVE records scored by frequency multiplied by severity (CVSS). Identifies the most common and impactful software weaknesses that developers and organizations should prioritize. Released November 19, 2024.
Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.
Framework Domains (6)
Authorization and Authentication
Weaknesses related to access control and identity verification
| Code | Title |
|---|---|
| CWE-269 | Improper Privilege Management |
| CWE-287 | Improper Authentication |
| CWE-306 | Missing Authentication for Critical Function |
| CWE-862 | Missing Authorization |
| CWE-863 | Incorrect Authorization |
Data Protection and Integrity
Weaknesses related to data exposure and integrity failures
| Code | Title |
|---|---|
| CWE-200 | Exposure of Sensitive Information to an Unauthorized Actor |
| CWE-352 | Cross-Site Request Forgery (CSRF) |
| CWE-502 | Deserialization of Untrusted Data |
File and Path Handling
Weaknesses related to file operations and path traversal
| Code | Title |
|---|---|
| CWE-22 | Path Traversal |
Injection and Input Validation
Weaknesses related to insufficient input validation and injection attacks
| Code | Title |
|---|---|
| CWE-20 | Improper Input Validation |
| CWE-434 | Unrestricted Upload of File with Dangerous Type |
| CWE-77 | Command Injection |
| CWE-78 | OS Command Injection |
| CWE-79 | Cross-site Scripting (XSS) |
| CWE-89 | SQL Injection |
| CWE-94 | Code Injection |
Memory Safety
Weaknesses related to memory management errors
| Code | Title |
|---|---|
| CWE-119 | Improper Restriction of Operations within Memory Buffer Bounds |
| CWE-125 | Out-of-bounds Read |
| CWE-190 | Integer Overflow or Wraparound |
| CWE-416 | Use After Free |
| CWE-476 | NULL Pointer Dereference |
| CWE-787 | Out-of-bounds Write |
Resource Management and Networking
Weaknesses related to resource consumption, SSRF, and hardcoded credentials
| Code | Title |
|---|---|
| CWE-400 | Uncontrolled Resource Consumption |
| CWE-798 | Use of Hard-coded Credentials |
| CWE-918 | Server-Side Request Forgery (SSRF) |
Maps to 223 other frameworks
Frequently Asked Questions
What is CWE Top 25 Most Dangerous Software Weaknesses (2024)?
CWE Top 25 Most Dangerous Software Weaknesses (2024) is a compliance framework from International with 6 domains and 25 controls. The 2024 CWE Top 25 Most Dangerous Software Weaknesses published by MITRE Corporation and supported by CISA. Based on analysis of 31,770 CVE records scored by frequency multiplied by severity (CVSS). Identifies the most common and impactful software weaknesses that developers and organizations should prioritize. Released November 19, 2024. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.
How many controls does CWE Top 25 Most Dangerous Software Weaknesses (2024) have?
CWE Top 25 Most Dangerous Software Weaknesses (2024) has 25 controls organised across 6 domains. The largest domains are Injection and Input Validation (7 controls), Memory Safety (6 controls), Authorization and Authentication (5 controls). Each control defines specific requirements that organisations must implement to achieve compliance.
What frameworks does CWE Top 25 Most Dangerous Software Weaknesses (2024) map to?
CWE Top 25 Most Dangerous Software Weaknesses (2024) maps to 223 other compliance frameworks. The top mapping partners are OWASP API Security Top 10:2023 (24% coverage), Cyber Essentials Plus (24% coverage), CSA STAR (Security, Trust, Assurance, and Risk) (24% coverage). Use our comparison tool to explore control-level mappings between frameworks.
How do I get started with CWE Top 25 Most Dangerous Software Weaknesses (2024) compliance?
Start your CWE Top 25 Most Dangerous Software Weaknesses (2024) compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about CWE Top 25 Most Dangerous Software Weaknesses (2024) requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 25 controls and track your progress.
Start Your Compliance Journey
Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.
Get Started Free →Free forever — no credit card required