HomeSample Page

Sample Page Title


MITRE shares 2025’s high 25 most harmful software program weaknesses

MITRE has shared this 12 months’s high 25 listing of probably the most harmful software program weaknesses behind over 39,000 safety vulnerabilities disclosed between June 2024 and June 2025.

The listing was launched in cooperation with the Homeland Safety Programs Engineering and Improvement Institute (HSSEDI) and the Cybersecurity and Infrastructure Safety Company (CISA), which handle and sponsor the Frequent Weak spot Enumeration (CWE) program.

Software program weaknesses could be flaws, bugs, vulnerabilities, or errors present in a software program’s code, implementation, structure, or design, and attackers can abuse them to breach programs operating the susceptible software program. Profitable exploitation permits risk actors to achieve management over compromised gadgets and set off denial-of-service assaults or entry delicate knowledge.

To create this 12 months’s rating, MITRE scored every weak point primarily based on its severity and frequency after analyzing 39,080 CVE Data for vulnerabilities reported between June 1, 2024, and June 1, 2025.

Whereas Cross-Web site Scripting (CWE-79) nonetheless retains its spot on the high of the Prime 25, there have been many adjustments in rankings from final 12 months’s listing, together with Lacking Authorization (CWE-862), Null Pointer Dereference (CWE-476), and Lacking Authentication (CWE-306), which have been the most important movers up the listing.

The brand new entries on this 12 months’s top-most extreme and prevalent weaknesses are Basic Buffer Overflow (CWE-120), Stack-based Buffer Overflow (CWE-121), Heap-based Buffer Overflow (CWE-122), Improper Entry Management (CWE-284), Authorization Bypass By way of Consumer-Managed Key (CWE-639), and Allocation of Assets With out Limits or Throttling (CWE-770).



























RankIDIdentifyRatingKEV CVEsChange
1CWE-79Cross-site Scripting60.3870
2CWE-89SQL Injection28.724+1
3CWE-352Cross-Web site Request Forgery (CSRF)13.640+1
4CWE-862Lacking Authorization13.280+5
5CWE-787Out-of-bounds Write12.6812-3
6CWE-22Path Traversal8.9910-1
7CWE-416Use After Free8.4714+1
8CWE-125Out-of-bounds Learn7.883-2
9CWE-78OS Command Injection7.8520-2
10CWE-94Code Injection7.577+1
11CWE-120Basic Buffer Overflow6.960N/A
12CWE-434Unrestricted Add of File with Harmful Kind6.874-2
13CWE-476NULL Pointer Dereference6.410+8
14CWE-121Stack-based Buffer Overflow5.754N/A
15CWE-502Deserialization of Untrusted Knowledge5.2311+1
16CWE-122Heap-based Buffer Overflow5.216N/A
17CWE-863Incorrect Authorization4.144+1
18CWE-20Improper Enter Validation4.092-6
19CWE-284Improper Entry Management4.071N/A
20CWE-200Publicity of Delicate Data4.011-3
21CWE-306Lacking Authentication for Crucial Operate3.4711+4
22CWE-918Server-Aspect Request Forgery (SSRF)3.360-3
23CWE-77Command Injection3.152-10
24CWE-639Authorization Bypass by way of Consumer-Managed Key2.620+6
25CWE-770Allocation of Assets w/o Limits or Throttling2.540+1

“Usually straightforward to seek out and exploit, these can result in exploitable vulnerabilities that permit adversaries to fully take over a system, steal knowledge, or forestall functions from working,” MITRE mentioned.

“This annual listing identifies probably the most essential weaknesses adversaries exploit to compromise programs, steal knowledge, or disrupt providers. CISA and MITRE encourage organizations to overview this listing and use it to tell their respective software program safety methods,” the U.S. Cybersecurity and Infrastructure Safety Company (CISA) added.

In recent times, CISA has issued a number of “Safe by Design” alerts spotlighting the prevalence of extensively documented vulnerabilities that stay in software program regardless of out there mitigations.

A few of these alerts have been launched in response to ongoing malicious campaigns, reminiscent of a July 2024 alert asking tech corporations to get rid of path OS command injection weaknesses exploited by the Chinese language Velvet Ant state hackers in assaults concentrating on Cisco, Palo Alto, and Ivanti community edge gadgets.

This week, the cybersecurity company suggested builders and product groups to overview the 2025 CWE Prime 25 to establish key weaknesses and undertake Safe by Design practices, whereas safety groups have been requested to combine it into their app safety testing and vulnerability administration processes.

In April 2025, CISA additionally introduced that the U.S. authorities had prolonged MITRE’s funding for an additional 11 months to make sure continuity of the essential Frequent Vulnerabilities and Exposures (CVE) program, following a warning from MITRE VP Yosry Barsoum that authorities funding for the CVE and CWE applications was set to run out.

Damaged IAM is not simply an IT drawback – the influence ripples throughout your entire enterprise.

This sensible information covers why conventional IAM practices fail to maintain up with fashionable calls for, examples of what “good” IAM seems like, and a easy guidelines for constructing a scalable technique.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles