Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Google DeepMind wants to know if chatbots are just virtue signaling

    The Download: a blockchain enigma, and the algorithms governing our lives

    Welcome to the dark side of crypto’s permissionless dream

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025
    • Crypto

      Is Bitcoin Price Entering a New Bear Market? Here’s Why Metrics Say Yes

      February 19, 2026

      Cardano’s Trading Activity Crashes to a 6-Month Low — Can ADA Still Attempt a Reversal?

      February 19, 2026

      Is Extreme Fear a Buy Signal? New Data Questions the Conventional Wisdom

      February 19, 2026

      Coinbase and Ledn Strengthen Crypto Lending Push Despite Market Slump

      February 19, 2026

      Bitcoin Caught Between Hawkish Fed and Dovish Warsh

      February 19, 2026
    • Technology

      Google DeepMind wants to know if chatbots are just virtue signaling

      February 19, 2026

      The Download: a blockchain enigma, and the algorithms governing our lives

      February 19, 2026

      Welcome to the dark side of crypto’s permissionless dream

      February 19, 2026

      The robots who predict the future

      February 19, 2026

      California Let Robots Build An Entire Neighborhood, Here’s What Happened To Prices

      February 19, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»MITRE shares 2025’s top 25 most dangerous software weaknesses
    Technology

    MITRE shares 2025’s top 25 most dangerous software weaknesses

    TechAiVerseBy TechAiVerseDecember 13, 2025No Comments4 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    MITRE shares 2025’s top 25 most dangerous software weaknesses
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    MITRE shares 2025’s top 25 most dangerous software weaknesses

    MITRE has shared this year’s top 25 list of the most dangerous software weaknesses behind over 39,000 security vulnerabilities disclosed between June 2024 and June 2025.

    The list was released in cooperation with the Homeland Security Systems Engineering and Development Institute (HSSEDI) and the Cybersecurity and Infrastructure Security Agency (CISA), which manage and sponsor the Common Weakness Enumeration (CWE) program.

    Software weaknesses can be flaws, bugs, vulnerabilities, or errors found in a software’s code, implementation, architecture, or design, and attackers can abuse them to breach systems running the vulnerable software. Successful exploitation allows threat actors to gain control over compromised devices and trigger denial-of-service attacks or access sensitive data.

    To create this year’s ranking, MITRE scored each weakness based on its severity and frequency after analyzing 39,080 CVE Records for vulnerabilities reported between June 1, 2024, and June 1, 2025.

    While Cross-Site Scripting (CWE-79) still retains its spot at the top of the Top 25, there were many changes in rankings from last year’s list, including Missing Authorization (CWE-862), Null Pointer Dereference (CWE-476), and Missing Authentication (CWE-306), which were the biggest movers up the list.

    The new entries in this year’s top-most severe and prevalent weaknesses are Classic Buffer Overflow (CWE-120), Stack-based Buffer Overflow (CWE-121), Heap-based Buffer Overflow (CWE-122), Improper Access Control (CWE-284), Authorization Bypass Through User-Controlled Key (CWE-639), and Allocation of Resources Without Limits or Throttling (CWE-770).

    Rank ID Name Score KEV CVEs Change
    1 CWE-79 Cross-site Scripting 60.38 7 0
    2 CWE-89 SQL Injection 28.72 4 +1
    3 CWE-352 Cross-Site Request Forgery (CSRF) 13.64 0 +1
    4 CWE-862 Missing Authorization 13.28 0 +5
    5 CWE-787 Out-of-bounds Write 12.68 12 -3
    6 CWE-22 Path Traversal 8.99 10 -1
    7 CWE-416 Use After Free 8.47 14 +1
    8 CWE-125 Out-of-bounds Read 7.88 3 -2
    9 CWE-78 OS Command Injection 7.85 20 -2
    10 CWE-94 Code Injection 7.57 7 +1
    11 CWE-120 Classic Buffer Overflow 6.96 0 N/A
    12 CWE-434 Unrestricted Upload of File with Dangerous Type 6.87 4 -2
    13 CWE-476 NULL Pointer Dereference 6.41 0 +8
    14 CWE-121 Stack-based Buffer Overflow 5.75 4 N/A
    15 CWE-502 Deserialization of Untrusted Data 5.23 11 +1
    16 CWE-122 Heap-based Buffer Overflow 5.21 6 N/A
    17 CWE-863 Incorrect Authorization 4.14 4 +1
    18 CWE-20 Improper Input Validation 4.09 2 -6
    19 CWE-284 Improper Access Control 4.07 1 N/A
    20 CWE-200 Exposure of Sensitive Information 4.01 1 -3
    21 CWE-306 Missing Authentication for Critical Function 3.47 11 +4
    22 CWE-918 Server-Side Request Forgery (SSRF) 3.36 0 -3
    23 CWE-77 Command Injection 3.15 2 -10
    24 CWE-639 Authorization Bypass via User-Controlled Key 2.62 0 +6
    25 CWE-770 Allocation of Resources w/o Limits or Throttling 2.54 0 +1

    “Often easy to find and exploit, these can lead to exploitable vulnerabilities that allow adversaries to completely take over a system, steal data, or prevent applications from working,” MITRE said.

    “This annual list identifies the most critical weaknesses adversaries exploit to compromise systems, steal data, or disrupt services. CISA and MITRE encourage organizations to review this list and use it to inform their respective software security strategies,” the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added.

    In recent years, CISA has issued multiple “Secure by Design” alerts spotlighting the prevalence of widely documented vulnerabilities that remain in software despite available mitigations.

    Some of these alerts have been released in response to ongoing malicious campaigns, such as a July 2024 alert asking tech companies to eliminate path OS command injection weaknesses exploited by the Chinese Velvet Ant state hackers in attacks targeting Cisco, Palo Alto, and Ivanti network edge devices.

    This week, the cybersecurity agency advised developers and product teams to review the 2025 CWE Top 25 to identify key weaknesses and adopt Secure by Design practices, while security teams were asked to integrate it into their app security testing and vulnerability management processes.

    In April 2025, CISA also announced that the U.S. government had extended MITRE’s funding for another 11 months to ensure continuity of the critical Common Vulnerabilities and Exposures (CVE) program, following a warning from MITRE VP Yosry Barsoum that government funding for the CVE and CWE programs was set to expire.

    Break down IAM silos like Bitpanda, KnowBe4, and PathAI

    Broken IAM isn’t just an IT problem – the impact ripples across your whole business.

    This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what “good” IAM looks like, and a simple checklist for building a scalable strategy.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleHow to watch John Cena’s final match: free streams, schedule for Saturday Night’s Main Event XLII
    Next Article CISA orders feds to patch actively exploited Geoserver flaw
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Google DeepMind wants to know if chatbots are just virtue signaling

    February 19, 2026

    The Download: a blockchain enigma, and the algorithms governing our lives

    February 19, 2026

    Welcome to the dark side of crypto’s permissionless dream

    February 19, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025684 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025273 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025156 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025117 Views
    Don't Miss
    Technology February 19, 2026

    Google DeepMind wants to know if chatbots are just virtue signaling

    Google DeepMind wants to know if chatbots are just virtue signaling With coding and math,…

    The Download: a blockchain enigma, and the algorithms governing our lives

    Welcome to the dark side of crypto’s permissionless dream

    The robots who predict the future

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Google DeepMind wants to know if chatbots are just virtue signaling

    February 19, 20260 Views

    The Download: a blockchain enigma, and the algorithms governing our lives

    February 19, 20260 Views

    Welcome to the dark side of crypto’s permissionless dream

    February 19, 20260 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.