CWE · MITRE source
CWE-155Improper Neutralization of Wildcards or Matching Symbols
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as wildcards or matching symbols when they are sent to a downstream component.
As data is parsed, an injected element may cause the process to take unexpected actions.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (0)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
| No NIST controls proposed yet. | |||
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2025-27515 | 2.0 | 9.8 | 0.0028 | 2025-03-05 |
CVE-2025-4232 | 1.8 | 8.8 | 0.0024 | 2025-06-13 |
CVE-2022-21646 | 1.6 | 8.1 | 0.0036 | 2022-01-11 |
CVE-2024-47791 | 1.5 | 7.5 | 0.0021 | 2024-12-06 |
CVE-2020-1772 | 1.3 | 6.5 | 0.0045 | 2020-03-27 |
CVE-2024-0054 | 1.3 | 6.5 | 0.0007 | 2024-03-19 |
CVE-2024-0055 | 1.3 | 6.5 | 0.0019 | 2024-03-19 |
CVE-2024-6509 | 1.3 | 6.5 | 0.0013 | 2024-09-10 |
CVE-2025-24376 | 1.3 | 6.5 | 0.0007 | 2025-01-30 |
CVE-2025-0681 | 1.2 | 6.2 | 0.0008 | 2025-01-30 |
CVE-2019-3802 | 1.1 | 5.3 | 0.0024 | 2019-06-03 |
CVE-2025-0106 | 1.1 | 5.3 | 0.0051 | 2025-01-11 |
CVE-2024-8688 | 0.9 | 4.4 | 0.0017 | 2024-09-11 |
CVE-2025-11757 | 0.0 | 0.0 | 0.0006 | 2025-10-21 |