Cyber Posture

CWE · MITRE source

CWE-73External Control of File Name or Path

Abstraction: Base · CVEs in our corpus: 397

The product allows user input to control or influence paths or file names that are used in filesystem operations.

This could allow an attacker to access or modify system files or other files that are critical to the application. Path manipulation errors occur when the following two conditions are met: For example, the program may give the attacker the ability to overwrite the specified file or run with a configuration controlled by the attacker.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (1)AI

Control Title Family Why it addresses this CWE
SI-10Information Input ValidationSIRejects externally supplied file or resource identifiers that fail validity checks.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2024-43451 KEV8.76.50.90312024-11-12
CVE-2018-172467.69.80.93782018-12-20
CVE-2022-399527.69.80.93782023-02-16
CVE-2024-85177.69.80.93322024-09-06
CVE-2023-46347.59.80.92062023-09-06
CVE-2025-33053 KEV6.88.80.50282025-06-10
CVE-2022-249006.49.90.73292022-04-29
CVE-2021-272505.56.50.70652021-04-14
CVE-2024-53345.37.50.62752024-06-27
CVE-2025-08514.69.80.43692025-01-29
CVE-2020-1631 KEV4.18.80.05402020-05-04
CVE-2024-469094.19.80.34882024-12-02
CVE-2023-36433.97.30.40672023-07-12
CVE-2025-24054 KEV3.86.50.07832025-03-11
CVE-2025-0111 KEV3.56.50.03692025-02-12
CVE-2023-309432.96.50.26762023-05-02
CVE-2022-24312.68.10.17142022-09-06
CVE-2024-261852.46.50.18892024-03-12
CVE-2024-553722.39.80.04862025-04-16
CVE-2024-120662.28.80.07292024-12-21
CVE-2024-00872.19.00.04622024-05-14
CVE-2025-01052.19.10.04372025-01-11
CVE-2020-97522.09.80.00502020-03-23
CVE-2021-384772.09.80.00212021-10-22
CVE-2023-360192.09.60.01082023-12-12