CWE · MITRE source
CWE-698Execution After Redirect (EAR)
The web application sends a redirect to another location, but instead of exiting, it executes additional code.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (0)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
| No NIST controls proposed yet. | |||
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2024-48766 | 6.4 | 8.6 | 0.7766 | 2025-05-13 |
CVE-2026-2699 | 3.5 | 9.8 | 0.2526 | 2026-04-02 |
CVE-2025-8350 | 2.0 | 9.8 | 0.0005 | 2026-02-19 |
CVE-2025-6967 | 1.7 | 8.7 | 0.0003 | 2026-02-10 |
CVE-2024-2569 | 1.5 | 7.3 | 0.0019 | 2024-03-18 |
CVE-2024-2570 | 1.5 | 7.3 | 0.0014 | 2024-03-18 |
CVE-2024-2571 | 1.5 | 7.3 | 0.0014 | 2024-03-18 |
CVE-2024-2572 | 1.5 | 7.3 | 0.0014 | 2024-03-18 |
CVE-2024-2573 | 1.5 | 7.3 | 0.0014 | 2024-03-18 |
CVE-2024-2635 | 1.5 | 7.3 | 0.0006 | 2024-03-19 |
CVE-2024-3376 | 1.5 | 7.3 | 0.0020 | 2024-04-06 |
CVE-2025-9848 | 1.5 | 7.3 | 0.0005 | 2025-09-03 |
CVE-2025-53077 | 1.3 | 6.5 | 0.0013 | 2025-07-29 |
CVE-2026-3262 | 1.3 | 6.3 | 0.0009 | 2026-02-26 |
CVE-2026-3264 | 1.3 | 6.3 | 0.0009 | 2026-02-26 |