SiteShadow
Back to vulnerability library

CWE-20 Improper Input Validation

What this means

SiteShadow flagged inputs that are used without adequate validation (type/format/range/allowlists). This is a "root cause" category that often leads to injection, authorization bypass, or data corruption.

Why it matters

Unvalidated input can trigger injection, logic bypass, or data corruption.

Safer examples

1) Validate with schemas/DTOs (recommended)

Use strict schemas that reject unknown fields and enforce types and bounds.

2) Use allowlists for identifiers and enums

If a value should be one of {A,B,C}, enforce that explicitly.

3) Validate at trust boundaries

Validate at the point you accept input (HTTP handlers, CLI args, webhooks), not deep inside business logic.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage