CWE-830: Inclusion of Web Functionality from an Untrusted Source
low-riskThe product includes web functionality (such as a web widget) from another domain, which causes it to operate within the domain of the product, potentially granting total access and control of the product to the untrusted source.
Abstraction: Variant
Common Consequences
Confidentiality
→
Execute Unauthorized Code or Commands
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2024-29944 | 8.4 | 1.4% | — |
| CVE-2023-2588 | 8.8 | 0.6% | — |
| CVE-2024-35180 | 6.1 | 0.4% | — |
| CVE-2024-42381 | 8.3 | 0.4% | — |
| CVE-2025-33028 | 6.1 | 0.2% | — |
| CVE-2025-33026 | 6.1 | 0.2% | — |
| CVE-2025-33027 | 6.1 | 0.2% | — |
| CVE-2025-43703 | 6.1 | 0.2% | — |
| CVE-2025-46652 | 6.1 | 0.2% | — |
| CVE-2021-28162 | 6.1 | 0.2% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal