CWE · MITRE source
CWE-95Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before using the input in a dynamic evaluation call (e.g. "eval").
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (0)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
| No NIST controls proposed yet. | |||
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2024-36401 KEV | 9.6 | 9.8 | 0.9443 | 2024-07-01 |
CVE-2025-24893 KEV | 9.6 | 9.8 | 0.9366 | 2025-02-20 |
CVE-2023-7101 KEV | 8.6 | 7.8 | 0.8331 | 2023-12-24 |
CVE-2024-31982 | 7.7 | 10.0 | 0.9425 | 2024-04-10 |
CVE-2024-21650 | 7.6 | 10.0 | 0.9254 | 2024-01-08 |
CVE-2024-7954 | 7.5 | 9.8 | 0.9315 | 2024-08-23 |
CVE-2023-37462 | 7.4 | 9.9 | 0.9026 | 2023-07-14 |
CVE-2024-36404 | 7.4 | 9.8 | 0.9075 | 2024-07-02 |
CVE-2013-10051 | 6.5 | 9.8 | 0.7581 | 2025-08-01 |
CVE-2026-33017 KEV | 6.4 | 9.8 | 0.4124 | 2026-03-20 |
CVE-2024-31984 | 5.6 | 9.9 | 0.6006 | 2024-04-10 |
CVE-2023-46731 | 5.4 | 10.0 | 0.5746 | 2023-11-06 |
CVE-2023-50721 | 4.6 | 9.9 | 0.4325 | 2023-12-15 |
CVE-2023-26477 | 4.4 | 10.0 | 0.4008 | 2023-03-02 |
CVE-2023-29509 | 4.1 | 9.9 | 0.3608 | 2023-04-16 |
CVE-2023-35150 | 4.1 | 9.9 | 0.3463 | 2023-06-23 |
CVE-2024-31465 | 4.1 | 9.9 | 0.3531 | 2024-04-10 |
CVE-2013-10070 | 3.8 | 0.0 | 0.6252 | 2025-08-05 |
CVE-2023-29511 | 3.7 | 9.9 | 0.2925 | 2023-04-16 |
CVE-2023-30537 | 3.7 | 9.9 | 0.2936 | 2023-04-16 |
CVE-2022-36099 | 3.3 | 9.9 | 0.2170 | 2022-09-08 |
CVE-2022-41931 | 3.1 | 9.9 | 0.1893 | 2022-11-23 |
CVE-2023-29209 | 3.1 | 9.9 | 0.1893 | 2023-04-15 |
CVE-2024-8512 | 3.1 | 9.1 | 0.2108 | 2024-10-30 |
CVE-2023-37909 | 2.6 | 9.9 | 0.1046 | 2023-10-25 |