CWE · MITRE source
CWE-96Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax before inserting the input into an executable resource, such as a library, configuration file, or template.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (1)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
SC-34 | Non-modifiable Executable Programs | SC | Eliminates the possibility of static code injection into saved executables by making the storage non-modifiable. |
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2024-55877 | 4.0 | 9.9 | 0.3339 | 2024-12-12 |
CVE-2021-39115 | 3.0 | 7.2 | 0.2574 | 2021-09-01 |
CVE-2024-55662 | 2.7 | 9.9 | 0.1277 | 2024-12-12 |
CVE-2020-6143 | 2.6 | 9.8 | 0.1078 | 2020-09-01 |
CVE-2020-6144 | 2.6 | 9.8 | 0.1078 | 2020-09-01 |
CVE-2023-39726 | 2.1 | 9.8 | 0.0159 | 2023-10-26 |
CVE-2024-43400 | 2.1 | 9.0 | 0.0569 | 2024-08-19 |
CVE-2015-2079 | 2.1 | 9.9 | 0.0278 | 2025-04-28 |
CVE-2022-0895 | 2.0 | 9.8 | 0.0120 | 2022-03-10 |
CVE-2022-43938 | 2.0 | 8.8 | 0.0454 | 2023-04-03 |
CVE-2024-13264 | 2.0 | 9.8 | 0.0022 | 2025-01-09 |
CVE-2025-57707 | 1.8 | 8.8 | 0.0007 | 2026-02-11 |
CVE-2024-32487 | 1.7 | 8.6 | 0.0033 | 2024-04-13 |
CVE-2024-37900 | 1.6 | 6.4 | 0.0533 | 2024-07-31 |
CVE-2024-13265 | 1.5 | 7.5 | 0.0014 | 2025-01-09 |
CVE-2024-13267 | 1.5 | 7.5 | 0.0014 | 2025-01-09 |
CVE-2025-36595 | 1.5 | 7.2 | 0.0069 | 2025-06-27 |
CVE-2024-13268 | 1.4 | 6.8 | 0.0012 | 2025-01-09 |
CVE-2022-3960 | 1.3 | 6.3 | 0.0063 | 2023-04-03 |
CVE-2024-0788 | 1.3 | 6.6 | 0.0004 | 2024-01-29 |
CVE-2025-7825 | 1.3 | 6.3 | 0.0010 | 2025-10-03 |
CVE-2024-13263 | 1.1 | 5.5 | 0.0009 | 2025-01-09 |
CVE-2025-30091 | 0.1 | 0.0 | 0.0140 | 2025-03-25 |