CWE · MITRE source
CWE-488Exposure of Data Element to Wrong Session
The product does not sufficiently enforce boundaries between the states of different sessions, causing data to be provided to, or used by, the wrong session.
Data can "bleed" from one session to another through member variables of singleton objects, such as Servlets, and objects from a shared pool. In the case of Servlets, developers sometimes do not understand that, unless a Servlet implements the SingleThreadModel interface, the Servlet is a singleton; there is only one instance of the Servlet, and that single instance is used and re-used to handle multiple requests that are processed simultaneously by different threads. A common result is that developers use Servlet member fields in such a way that one user may inadvertently see another user's data. In other words, storing user data in Servlet member fields introduces a data access race condition.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (0)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
| No NIST controls proposed yet. | |||
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2024-38367 | 1.9 | 8.2 | 0.0499 | 2024-07-01 |
CVE-2024-27455 | 1.8 | 9.1 | 0.0019 | 2024-02-26 |
CVE-2025-47928 | 1.8 | 9.1 | 0.0029 | 2025-05-15 |
CVE-2025-1247 | 1.7 | 8.3 | 0.0005 | 2025-02-13 |
CVE-2024-6162 | 1.6 | 7.5 | 0.0202 | 2024-06-20 |
CVE-2023-1907 | 1.6 | 8.0 | 0.0010 | 2025-01-09 |
CVE-2023-6519 | 1.5 | 7.5 | 0.0007 | 2024-02-08 |
CVE-2024-27935 | 1.5 | 7.2 | 0.0040 | 2024-03-21 |
CVE-2024-41977 | 1.5 | 7.1 | 0.0124 | 2024-08-13 |
CVE-2024-5148 | 1.5 | 7.5 | 0.0036 | 2024-09-02 |
CVE-2025-30073 | 1.5 | 7.5 | 0.0017 | 2025-03-26 |
CVE-2025-15576 | 1.5 | 7.5 | 0.0001 | 2026-03-09 |
CVE-2026-34391 | 1.5 | 7.5 | 0.0003 | 2026-03-27 |
CVE-2022-40210 | 1.4 | 6.8 | 0.0007 | 2023-05-10 |
CVE-2026-23646 | 1.3 | 6.5 | 0.0005 | 2026-01-19 |
CVE-2026-33215 | 1.3 | 6.5 | 0.0002 | 2026-03-24 |
CVE-2025-2312 | 1.2 | 5.9 | 0.0002 | 2025-03-25 |
CVE-2024-7049 | 1.1 | 5.4 | 0.0006 | 2024-10-10 |
CVE-2024-11094 | 1.1 | 5.3 | 0.0040 | 2024-11-16 |
CVE-2025-24934 | 1.1 | 5.4 | 0.0003 | 2025-10-22 |
CVE-2024-1223 | 1.0 | 4.8 | 0.0011 | 2024-03-14 |
CVE-2025-27606 | 1.0 | 5.1 | 0.0008 | 2025-03-14 |
CVE-2026-23844 | 0.9 | 4.3 | 0.0004 | 2026-01-19 |
CVE-2026-27492 | 0.9 | 4.7 | 0.0001 | 2026-02-21 |
CVE-2024-8314 | 0.0 | 0.0 | 0.0020 | 2025-03-25 |