Cookies Notice
This site uses cookies to deliver services and to analyze traffic.
📣 Introducing AI Threat Modeling: Preventing Risks Before Code Exists
Common Weakness Enumeration (CWE) is a community-developed catalog of software and hardware weakness types maintained by MITRE Corporation. Each entry in the common weakness enumeration list describes a specific category of flaw, such as buffer overflow, SQL injection, or improper authentication, that can lead to exploitable vulnerabilities in real-world software.
The Mitre Common Weakness Enumeration serves as a shared language for describing security weaknesses across the industry. When a SAST tool flags a finding as CWE-79, every developer, security engineer, and auditor understands it refers to improper neutralization of input during web page generation (cross-site scripting). This standardization makes it possible to compare findings across tools, track weakness trends across codebases, and build training programs around the specific flaw types that matter most to an organization.
The CWE list is organized as a hierarchical classification system with over 900 entries. Weaknesses are grouped at multiple levels of abstraction. These include:
This hierarchy allows users to work at whatever level of detail fits their needs. A CISO reviewing portfolio risk might look at pillar-level trends. A developer fixing a specific finding works with base or variant entries that include code examples and remediation guidance.
MITRE maintains the list with input from industry contributors, tool vendors, researchers, and government agencies. Updates are released periodically to add new weakness types, refine descriptions, and adjust relationships between entries.
The CWE Top 25 Most Dangerous Software Weaknesses list, published annually, ranks weaknesses by prevalence and severity using real-world vulnerability data, giving teams a prioritized starting point for their secure coding efforts.
CWE, CVE, and CVSS serve different purposes in the vulnerability management ecosystem, but they connect directly:
| System | What It Does | Scope | Example |
| CWE | Classifies types of weaknesses in software and hardware | Weakness categories (abstract) | CWE-89: SQL Injection |
| CVE | Identifies specific, disclosed vulnerabilities in specific products | Individual vulnerability instances | CVE-2024-12345: SQL injection in Product X v2.1 |
| CVSS | Scores the severity of a specific vulnerability | Severity rating (0-10 scale) | CVSS 9.8: Critical, network-exploitable, no auth required |
A CWE vulnerability entry describes the general flaw pattern. A CVE record identifies a specific instance of that flaw in a specific product. CVSS provides a severity score for that specific instance.
In practice, these systems work together throughout the vulnerability lifecycle. A SAST tool detects a code pattern matching CWE-89 (SQL injection). If that flaw is disclosed publicly, it receives a CVE identifier. The CVE is then scored using CVSS to communicate severity. Security teams use all three to categorize, track, and prioritize their response.
Understanding why a significant share of CVEs trace directly to code-level vulnerabilities reinforces why CWE matters: most disclosed vulnerabilities map back to known weakness types that could have been caught during development.
CWE provides several practical benefits for security and development teams, including:
Related Content: How LTP and Apiiro Together Forge a Stronger, Resilient Framework
MITRE Corporation maintains CWE with community input. The list is updated periodically as new weakness types emerge, and the CWE Top 25 is published annually.
A CWE entry describes a general category of weakness (e.g., SQL injection). A CVE record identifies a specific instance of a vulnerability found in a specific product or version.
Tools map each finding to its corresponding CWE ID, providing a standardized classification. This enables cross-tool comparison, trend tracking, and consistent reporting across the organization.
Teams identify their most frequent CWE findings and build targeted training around those weakness types. CWE entries include code examples and remediation guidance for each category.
CWE covers both. The Hardware Design view, introduced in recent versions, catalogs weaknesses specific to hardware logic, firmware, and physical security mechanisms alongside software entries.