CWE · MITRE source
CWE-799Improper Control of Interaction Frequency
The product does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests.
This can allow the actor to perform actions more frequently than expected. The actor could be a human or an automated process such as a virus or bot. This could be used to cause a denial of service, compromise program logic (such as limiting humans to a single vote), or other consequences. For example, an authentication routine might not limit the number of times an attacker can guess a password. Or, a web site might conduct a poll but only expect humans to vote a maximum of once a day.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (3)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
PL-6 | Security-related Activity Planning | PL | The control requires defining frequency, timing, and approval for security interactions, directly addressing uncontrolled interaction rates. |
SC-6 | Resource Availability | SC | Allocation policies inherently restrict interaction frequency, reducing the impact of excessive requests. |
SI-8 | Spam Protection | SI | Spam protection explicitly controls interaction frequency by detecting and acting on bulk unsolicited messages from external sources. |
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2025-54321 | 2.0 | 9.8 | 0.0003 | 2025-11-18 |
CVE-2024-6890 | 1.8 | 8.8 | 0.0011 | 2024-08-07 |
CVE-2021-41177 | 1.7 | 8.1 | 0.0062 | 2021-10-25 |
CVE-2026-24017 | 1.6 | 8.1 | 0.0014 | 2026-03-10 |
CVE-2026-32729 | 1.6 | 8.1 | 0.0006 | 2026-03-16 |
CVE-2026-7402 | 1.6 | 8.1 | 0.0001 | 2026-04-30 |
CVE-2023-35621 | 1.5 | 7.5 | 0.0056 | 2023-12-12 |
CVE-2024-32943 | 1.5 | 7.5 | 0.0029 | 2024-06-20 |
CVE-2024-35246 | 1.5 | 7.5 | 0.0029 | 2024-06-20 |
CVE-2024-45788 | 1.5 | 7.5 | 0.0049 | 2024-09-11 |
CVE-2024-47654 | 1.5 | 7.5 | 0.0062 | 2024-10-04 |
CVE-2025-57816 | 1.5 | 7.5 | 0.0004 | 2025-09-08 |
CVE-2026-30972 | 1.5 | 7.5 | 0.0006 | 2026-03-10 |
CVE-2024-51557 | 1.4 | 6.5 | 0.0123 | 2024-11-04 |
CVE-2020-5141 | 1.3 | 6.5 | 0.0046 | 2020-10-12 |
CVE-2023-38068 | 1.3 | 6.5 | 0.0000 | 2023-07-12 |
CVE-2023-27279 | 1.3 | 6.5 | 0.0013 | 2024-04-19 |
CVE-2024-34695 | 1.3 | 6.3 | 0.0039 | 2024-05-14 |
CVE-2023-40673 | 1.3 | 6.5 | 0.0028 | 2024-06-04 |
CVE-2024-8475 | 1.3 | 6.5 | 0.0006 | 2024-12-17 |
CVE-2024-57603 | 1.3 | 6.3 | 0.0039 | 2025-02-12 |
CVE-2024-47065 | 1.3 | 6.5 | 0.0011 | 2025-07-11 |
CVE-2026-22216 | 1.3 | 6.5 | 0.0007 | 2026-03-13 |
CVE-2016-6543 | 1.2 | 5.9 | 0.0087 | 2018-07-13 |
CVE-2024-9199 | 1.2 | 5.8 | 0.0011 | 2024-09-26 |