Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Top 25 Most Dangerous Software Weaknesses of 2025 Revealed
Cyber Security

Top 25 Most Dangerous Software Weaknesses of 2025 Revealed

Team-CWDBy Team-CWDDecember 15, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The MITRE Corporation has released the 25 most dangerous software “weaknesses” in a new list that will help inform developers, network defenders and procurement teams.

The annual CWE Top 25 list was this year compiled from the weaknesses (CWEs) behind 39,080 CVEs.

“Uncovering the root causes of these vulnerabilities serves as a powerful guide for investments, policies, and practices to prevent these vulnerabilities from occurring in the first place – benefiting both industry and government stakeholders,” MITRE claimed.

Top of the list once again was cross-site scripting (XSS), while SQL injection moved up one place to second and cross-site request forgery moved up one to third. Use-after-free (in eighth place) and code injection (tenth) both moved up one from last year.

Among the top 10, out-of-bounds write (fifth), path traversal (sixth), out-of-bounds read (eighth) and OS command injection (ninth) all dropped down from their rankings last year.

Read more on CWEs: MITRE Unveils Top 25 Most Critical Software Flaws

The rankings are calculated by scoring each weakness based on its severity and the frequency of in-the-wild exploits.

This year, there were new entries for classic buffer overflow, stack-based buffer overflow, heap-based buffer overflow, improper access control, authorization bypass through user-controlled key, and allocation of resources without limits or throttling.

However, AppOmni CSO, Cory Michal, argued that there should have been a place on the Top 25 for “insufficiently protected credentials,” given how dangerous weak credential handling is.

“When major SaaS integration providers like Commvault, Salesloft/Drift and Gainsight are breached and attackers walk away with OAuth2 tokens, those ‘credentials’ become a skeleton key into thousands of downstream SaaS tenants,” he explained.

“We’re seeing adversaries use those stolen tokens to access CRM and collaboration data without ever touching a user’s password, and I’d expect that pattern, and therefore CWE-522’s real-world impact to keep growing in 2026.”

That said, the new list highlights how identity, authorization and access control issues are now very much front and center for security teams.

“When weaknesses like missing authentication, improper access control and authorization bypass, all climb or enter the Top 25, it’s a signal that attackers are consistently succeeding at finding and exploiting gaps in authentication and authorization logic,” Michal said.

“In today’s SaaS and AI world, where apps are interconnected by APIs and integrations, these weaknesses quickly turn into lateral movement, data exposure and realized risk.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAsahi to Launch Cybersecurity Overhaul After Crippling Cyber-Attack
Next Article Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

In memoriam: David Harley

November 12, 2025

Look out for phony verification pages spreading malware

September 14, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.