CWE-694: Use of Multiple Resources with Duplicate Identifier
low-riskThe product uses multiple resources that can have the same identifier, in a context in which unique identifiers are required.
Abstraction: Base
Common Consequences
Access Control
→
Bypass Protection Mechanism
Other
→
Quality Degradation
Real-World Examples (8)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2023-20100 | 6.8 | 1.1% | — |
| CVE-2021-3436 | 4.3 | 0.3% | — |
| CVE-2020-15185 | 2.2 | 0.2% | — |
| CVE-2020-15187 | 3.0 | 0.2% | — |
| CVE-2025-13609 | 8.2 | 0.1% | — |
| CVE-2024-41146 | 4.6 | 0.1% | — |
| CVE-2025-59048 | 8.1 | 0.0% | — |
| CVE-2022-23721 | 3.8 | 0.0% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal