Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    TSA Allows You To Add Your Passport To This Apple Wallet Alternative

    OpenAI taps Tata for 100MW AI data center capacity in India, eyes 1GW

    OpenAI deepens India push with Pine Labs fintech partnership

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026

      To avoid accusations of AI cheating, college students are turning to AI

      January 29, 2026

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026
    • Business

      The HDD brand that brought you the 1.8-inch, 2.5-inch, and 3.5-inch hard drives is now back with a $19 pocket-sized personal cloud for your smartphones

      February 12, 2026

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025
    • Crypto

      Wall Street Moves Into Prediction Markets With Election-Contract ETF Filings

      February 18, 2026

      Tectonic to Host Inaugural Quantum Summit at ETHDenver 2026 Focused on Post-Quantum Cryptography Readiness for Web3

      February 18, 2026

      Ki Young Ju Says Bitcoin May Need to Hit $55K Before True Recovery Begins

      February 18, 2026

      MYX Finance Is Oversold For The First Time Ever, Yet No Relief In Sight

      February 18, 2026

      Everyone is Talking about the SaaSpocalypse, But Why Does it matter for Crypto?

      February 18, 2026
    • Technology

      TSA Allows You To Add Your Passport To This Apple Wallet Alternative

      February 19, 2026

      OpenAI taps Tata for 100MW AI data center capacity in India, eyes 1GW

      February 19, 2026

      OpenAI deepens India push with Pine Labs fintech partnership

      February 19, 2026

      Etsy sells secondhand clothing marketplace Depop to eBay for $1.2B

      February 19, 2026

      Hacking conference Def Con bans three people linked to Epstein

      February 19, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»MITRE shares 2025’s top 25 most dangerous software weaknesses
    Technology

    MITRE shares 2025’s top 25 most dangerous software weaknesses

    TechAiVerseBy TechAiVerseDecember 13, 2025No Comments4 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    MITRE shares 2025’s top 25 most dangerous software weaknesses
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    MITRE shares 2025’s top 25 most dangerous software weaknesses

    MITRE has shared this year’s top 25 list of the most dangerous software weaknesses behind over 39,000 security vulnerabilities disclosed between June 2024 and June 2025.

    The list was released in cooperation with the Homeland Security Systems Engineering and Development Institute (HSSEDI) and the Cybersecurity and Infrastructure Security Agency (CISA), which manage and sponsor the Common Weakness Enumeration (CWE) program.

    Software weaknesses can be flaws, bugs, vulnerabilities, or errors found in a software’s code, implementation, architecture, or design, and attackers can abuse them to breach systems running the vulnerable software. Successful exploitation allows threat actors to gain control over compromised devices and trigger denial-of-service attacks or access sensitive data.

    To create this year’s ranking, MITRE scored each weakness based on its severity and frequency after analyzing 39,080 CVE Records for vulnerabilities reported between June 1, 2024, and June 1, 2025.

    While Cross-Site Scripting (CWE-79) still retains its spot at the top of the Top 25, there were many changes in rankings from last year’s list, including Missing Authorization (CWE-862), Null Pointer Dereference (CWE-476), and Missing Authentication (CWE-306), which were the biggest movers up the list.

    The new entries in this year’s top-most severe and prevalent weaknesses are Classic Buffer Overflow (CWE-120), Stack-based Buffer Overflow (CWE-121), Heap-based Buffer Overflow (CWE-122), Improper Access Control (CWE-284), Authorization Bypass Through User-Controlled Key (CWE-639), and Allocation of Resources Without Limits or Throttling (CWE-770).

    Rank ID Name Score KEV CVEs Change
    1 CWE-79 Cross-site Scripting 60.38 7 0
    2 CWE-89 SQL Injection 28.72 4 +1
    3 CWE-352 Cross-Site Request Forgery (CSRF) 13.64 0 +1
    4 CWE-862 Missing Authorization 13.28 0 +5
    5 CWE-787 Out-of-bounds Write 12.68 12 -3
    6 CWE-22 Path Traversal 8.99 10 -1
    7 CWE-416 Use After Free 8.47 14 +1
    8 CWE-125 Out-of-bounds Read 7.88 3 -2
    9 CWE-78 OS Command Injection 7.85 20 -2
    10 CWE-94 Code Injection 7.57 7 +1
    11 CWE-120 Classic Buffer Overflow 6.96 0 N/A
    12 CWE-434 Unrestricted Upload of File with Dangerous Type 6.87 4 -2
    13 CWE-476 NULL Pointer Dereference 6.41 0 +8
    14 CWE-121 Stack-based Buffer Overflow 5.75 4 N/A
    15 CWE-502 Deserialization of Untrusted Data 5.23 11 +1
    16 CWE-122 Heap-based Buffer Overflow 5.21 6 N/A
    17 CWE-863 Incorrect Authorization 4.14 4 +1
    18 CWE-20 Improper Input Validation 4.09 2 -6
    19 CWE-284 Improper Access Control 4.07 1 N/A
    20 CWE-200 Exposure of Sensitive Information 4.01 1 -3
    21 CWE-306 Missing Authentication for Critical Function 3.47 11 +4
    22 CWE-918 Server-Side Request Forgery (SSRF) 3.36 0 -3
    23 CWE-77 Command Injection 3.15 2 -10
    24 CWE-639 Authorization Bypass via User-Controlled Key 2.62 0 +6
    25 CWE-770 Allocation of Resources w/o Limits or Throttling 2.54 0 +1

    “Often easy to find and exploit, these can lead to exploitable vulnerabilities that allow adversaries to completely take over a system, steal data, or prevent applications from working,” MITRE said.

    “This annual list identifies the most critical weaknesses adversaries exploit to compromise systems, steal data, or disrupt services. CISA and MITRE encourage organizations to review this list and use it to inform their respective software security strategies,” the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added.

    In recent years, CISA has issued multiple “Secure by Design” alerts spotlighting the prevalence of widely documented vulnerabilities that remain in software despite available mitigations.

    Some of these alerts have been released in response to ongoing malicious campaigns, such as a July 2024 alert asking tech companies to eliminate path OS command injection weaknesses exploited by the Chinese Velvet Ant state hackers in attacks targeting Cisco, Palo Alto, and Ivanti network edge devices.

    This week, the cybersecurity agency advised developers and product teams to review the 2025 CWE Top 25 to identify key weaknesses and adopt Secure by Design practices, while security teams were asked to integrate it into their app security testing and vulnerability management processes.

    In April 2025, CISA also announced that the U.S. government had extended MITRE’s funding for another 11 months to ensure continuity of the critical Common Vulnerabilities and Exposures (CVE) program, following a warning from MITRE VP Yosry Barsoum that government funding for the CVE and CWE programs was set to expire.

    Break down IAM silos like Bitpanda, KnowBe4, and PathAI

    Broken IAM isn’t just an IT problem – the impact ripples across your whole business.

    This practical guide covers why traditional IAM practices fail to keep up with modern demands, examples of what “good” IAM looks like, and a simple checklist for building a scalable strategy.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleHow to watch John Cena’s final match: free streams, schedule for Saturday Night’s Main Event XLII
    Next Article CISA orders feds to patch actively exploited Geoserver flaw
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    TSA Allows You To Add Your Passport To This Apple Wallet Alternative

    February 19, 2026

    OpenAI taps Tata for 100MW AI data center capacity in India, eyes 1GW

    February 19, 2026

    OpenAI deepens India push with Pine Labs fintech partnership

    February 19, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025684 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025273 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025156 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025117 Views
    Don't Miss
    Technology February 19, 2026

    TSA Allows You To Add Your Passport To This Apple Wallet Alternative

    TSA Allows You To Add Your Passport To This Apple Wallet Alternative Ilona Titova/Getty Images…

    OpenAI taps Tata for 100MW AI data center capacity in India, eyes 1GW

    OpenAI deepens India push with Pine Labs fintech partnership

    Etsy sells secondhand clothing marketplace Depop to eBay for $1.2B

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    TSA Allows You To Add Your Passport To This Apple Wallet Alternative

    February 19, 20262 Views

    OpenAI taps Tata for 100MW AI data center capacity in India, eyes 1GW

    February 19, 20262 Views

    OpenAI deepens India push with Pine Labs fintech partnership

    February 19, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    This new Roomba finally solves the big problem I have with robot vacuums

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.