CWE · MITRE source
CWE-91XML Injection (aka Blind XPath Injection)
The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax, content, or commands of the XML before it is processed by an end system.
Within XML, special elements could include reserved words or characters such as "<", ">", """, and "&", which could then be used to add new data or modify XML syntax.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (0)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
| No NIST controls proposed yet. | |||
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2020-0646 KEV | 9.6 | 9.8 | 0.9386 | 2020-01-14 |
CVE-2023-43187 | 7.2 | 9.8 | 0.8770 | 2023-09-27 |
CVE-2023-46214 | 6.9 | 8.0 | 0.8778 | 2023-11-16 |
CVE-2023-27253 | 6.4 | 8.8 | 0.7775 | 2023-03-17 |
CVE-2020-29599 | 5.7 | 7.8 | 0.6875 | 2020-12-07 |
CVE-2022-25356 | 5.4 | 5.3 | 0.7287 | 2022-04-05 |
CVE-2022-34253 | 3.7 | 7.2 | 0.3719 | 2022-08-16 |
CVE-2019-25137 | 3.6 | 7.2 | 0.3552 | 2023-05-18 |
CVE-2021-36020 | 3.5 | 8.2 | 0.3107 | 2021-09-01 |
CVE-2019-16941 | 3.3 | 9.8 | 0.2286 | 2019-09-28 |
CVE-2019-17626 | 3.0 | 9.8 | 0.1684 | 2019-10-16 |
CVE-2024-53675 | 3.0 | 7.3 | 0.2501 | 2024-11-26 |
CVE-2019-14277 | 2.7 | 9.8 | 0.1252 | 2019-07-26 |
CVE-2015-6970 | 2.5 | 9.8 | 0.0943 | 2020-02-18 |
CVE-2021-36022 | 2.5 | 9.1 | 0.1133 | 2021-09-01 |
CVE-2021-36028 | 2.5 | 9.1 | 0.1133 | 2021-09-01 |
CVE-2021-36033 | 2.5 | 9.1 | 0.1133 | 2021-09-01 |
CVE-2019-19450 | 2.5 | 9.8 | 0.0948 | 2023-09-20 |
CVE-2013-7429 | 2.1 | 9.8 | 0.0158 | 2017-09-14 |
CVE-2020-29128 | 2.1 | 9.8 | 0.0188 | 2020-11-26 |
CVE-2021-21019 | 2.1 | 9.1 | 0.0403 | 2021-02-11 |
CVE-2021-21025 | 2.1 | 9.1 | 0.0472 | 2021-02-11 |
CVE-2021-36359 | 2.1 | 8.8 | 0.0488 | 2021-08-30 |
CVE-2013-4857 | 2.0 | 9.8 | 0.0110 | 2019-10-25 |
CVE-2019-8158 | 2.0 | 9.8 | 0.0016 | 2019-11-06 |