CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data
low-riskThe product, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted.
Abstraction: Base
Common Consequences
Access Control
→
Bypass Protection Mechanism
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2019-9535 | 9.8 | 1.4% | — |
| CVE-2018-1131 | 8.8 | 0.5% | — |
| CVE-2024-21094 | 3.7 | 0.4% | — |
| CVE-2021-21374 | 8.1 | 0.3% | — |
| CVE-2023-5548 | 3.3 | 0.3% | — |
| CVE-2025-48804 | 6.8 | 0.2% | — |
| CVE-2025-29842 | 7.5 | 0.2% | — |
| CVE-2025-27415 | 7.5 | 0.2% | — |
| CVE-2024-25638 | 8.9 | 0.2% | — |
| CVE-2023-44317 | 7.2 | 0.1% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal