CWE-940: Improper Verification of Source of a Communication Channel
low-riskThe product establishes a communication channel to handle an incoming request that has been initiated by an actor, but it does not properly verify that the request is coming from the expected origin.
Abstraction: Base
Common Consequences
Access Control
→
Gain Privileges or Assume Identity
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2024-40515 | 9.8 | 6.6% | — |
| CVE-2024-40516 | 8.8 | 3.1% | — |
| CVE-2025-61932 | 9.8 | 1.4% | Y |
| CVE-2023-48387 | 8.8 | 1.0% | — |
| CVE-2024-40503 | 6.5 | 0.9% | — |
| CVE-2024-38886 | 9.8 | 0.9% | — |
| CVE-2023-3663 | 8.8 | 0.7% | — |
| CVE-2023-51440 | 7.5 | 0.4% | — |
| CVE-2024-1621 | 7.5 | 0.3% | — |
| CVE-2023-41355 | 9.8 | 0.3% | — |
1
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
1/50 · Minimal