CWE · MITRE source
CWE-779Logging of Excessive Data
The product logs too much information, making log files hard to process and possibly hindering recovery efforts or forensic analysis after an attack.
While logging is a good practice in general, and very high levels of logging are appropriate for debugging stages of development, too much logging in a production environment might hinder a system administrator's ability to detect anomalous conditions. This can provide cover for an attacker while attempting to penetrate a system, clutter the audit trail for forensic analysis, or make it more difficult to debug problems in a production environment.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (1)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
AU-7 | Audit Record Reduction and Report Generation | AU | Audit record reduction explicitly manages excessive log volumes for review and reporting while preserving original content and ordering, reducing the impact of logging excessive data. |
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2024-36416 | 4.4 | 8.6 | 0.4470 | 2024-06-10 |
CVE-2024-36072 | 2.3 | 9.8 | 0.0593 | 2024-06-27 |
CVE-2022-31004 | 1.5 | 7.5 | 0.0015 | 2022-06-02 |
CVE-2024-55628 | 1.5 | 7.5 | 0.0054 | 2025-01-06 |
CVE-2025-8696 | 1.5 | 7.5 | 0.0012 | 2025-09-10 |
CVE-2026-28718 | 1.5 | 7.5 | 0.0010 | 2026-03-06 |
CVE-2021-25420 | 1.1 | 5.5 | 0.0010 | 2021-06-11 |
CVE-2021-25421 | 1.1 | 5.5 | 0.0010 | 2021-06-11 |
CVE-2021-25422 | 1.1 | 5.5 | 0.0010 | 2021-06-11 |
CVE-2021-25423 | 1.1 | 5.5 | 0.0010 | 2021-06-11 |
CVE-2022-22291 | 1.1 | 5.5 | 0.0004 | 2022-02-11 |
CVE-2023-23949 | 1.1 | 5.4 | 0.0071 | 2023-01-26 |
CVE-2024-1141 | 1.1 | 5.5 | 0.0003 | 2024-02-01 |
CVE-2025-53636 | 1.1 | 5.4 | 0.0026 | 2025-07-11 |
CVE-2025-51397 | 1.1 | 5.4 | 0.0051 | 2025-07-21 |
CVE-2025-69230 | 1.1 | 5.3 | 0.0001 | 2026-01-06 |
CVE-2022-25779 | 0.9 | 4.3 | 0.0034 | 2022-05-04 |
CVE-2022-39874 | 0.8 | 4.0 | 0.0006 | 2022-10-07 |