CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data

low-risk

The product, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted.

Abstraction: Base

Common Consequences

Access Control Bypass Protection Mechanism

Real-World Examples (10)

CVE CVSS EPSS KEV
CVE-2019-9535 9.8 1.4%
CVE-2018-1131 8.8 0.5%
CVE-2024-21094 3.7 0.4%
CVE-2021-21374 8.1 0.3%
CVE-2023-5548 3.3 0.3%
CVE-2025-48804 6.8 0.2%
CVE-2025-29842 7.5 0.2%
CVE-2025-27415 7.5 0.2%
CVE-2024-25638 8.9 0.2%
CVE-2023-44317 7.2 0.1%
0
/ 100
low-risk
Active Threat 0/50 · Minimal
Exploit Availability 0/50 · Minimal