Cyber Posture

CWE · MITRE source

CWE-501Trust Boundary Violation

Abstraction: Base · CVEs in our corpus: 23

The product mixes trusted and untrusted data in the same data structure or structured message.

A trust boundary can be thought of as line drawn through a program. On one side of the line, data is untrusted. On the other side of the line, data is assumed to be trustworthy. The purpose of validation logic is to allow data to safely cross the trust boundary - to move from untrusted to trusted. A trust boundary violation occurs when a program blurs the line between what is trusted and what is untrusted. By combining trusted and untrusted data in the same data structure, it becomes easier for programmers to mistakenly trust unvalidated data.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (9)AI

Control Title Family Why it addresses this CWE
AC-20Use of External SystemsACEstablishes and maintains trust boundaries with external organizations before allowing their systems to interact with organization resources.
AC-4Information Flow EnforcementACPrevents information from crossing trust boundaries without explicit approved authorizations.
CA-3Information ExchangeCADefining interfaces, controls, and trust responsibilities in agreements helps prevent violations of trust boundaries during data exchanges.
CA-9Internal System ConnectionsCAAuthorizing and reviewing connections helps maintain proper trust boundaries between internal components.
SC-16Transmission of Security and Privacy AttributesSCExplicitly binding attributes to information crossing trust boundaries prevents loss of security context that leads to trust-boundary violations.
SC-46Cross Domain Policy EnforcementSCBy mediating every interface between security domains, the mechanism upholds trust boundaries and blocks violations that would allow untrusted data or commands to cross.
MP-5Media TransportMPControlling media movement outside controlled areas maintains separation between internal and external trust boundaries.
PM-24Data Integrity BoardPMReview of inter-system matching programs identifies and corrects trust-boundary violations before data crosses organizational or policy domains.
PT-3Personally Identifiable Information Processing PurposesPTDefines explicit trust boundaries for PII use via documented purposes and prevents processing outside those boundaries.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2025-61884 KEV6.47.50.48322025-10-12
CVE-2025-489382.09.80.00402025-05-30
CVE-2026-257252.010.00.00022026-02-06
CVE-2024-490501.98.80.02992024-11-12
CVE-2023-285971.78.30.00632023-03-27
CVE-2024-236821.78.20.00282024-01-19
CVE-2024-36611.77.60.02912024-05-06
CVE-2020-40761.67.80.00082020-07-07
CVE-2020-40771.67.70.00442020-07-07
CVE-2025-497141.67.80.00792025-07-08
CVE-2025-644961.57.30.00142025-11-08
CVE-2025-145421.57.50.00082025-12-13
CVE-2019-00351.46.80.00052019-04-10
CVE-2020-150961.46.80.00242020-07-07
CVE-2023-06291.47.10.00072023-03-13
CVE-2023-497881.47.20.00082023-12-08
CVE-2022-208261.36.40.00402022-11-15
CVE-2023-06271.36.70.00032023-09-25
CVE-2024-17251.36.50.00142024-03-07
CVE-2024-202651.25.90.00022024-03-27
CVE-2022-17991.15.70.00152022-07-29
CVE-2026-241531.05.20.00012026-03-31
CVE-2025-11180.94.40.00022025-02-19