CWE-829 Inclusion of Functionality from Untrusted Control Sphere – Detailed Weakness Analysis

Explore CAPEC attack patterns referencing this CWE.

What is CWE (Common Weakness Enumeration)?

The Common Weakness Enumeration (CWE) is a community-developed list of common software and hardware weaknesses. By identifying these weaknesses, developers and security practitioners can prioritize and address potential vulnerabilities early in the development cycle. Explore our comprehensive CWE list below to better understand and mitigate common security issues.

CAPEC Patterns referencing CWE-829

Below is a list of CAPEC attack patterns associated with this CWE-829. Click on each CAPEC to learn more. The right column shows the related weaknesses (including this one).

CAPEC Related Weaknesses
Code Inclusion
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
Serialized Data External Linking
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
DTD Injection
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
Local Code Inclusion
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
PHP Local File Inclusion
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
Remote Code Inclusion
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
Force Use of Corrupted Files
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
Open-Source Library Manipulation
CWE-494 Download of Code Without Integrity Check
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
Local Execution of Code
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
Inclusion of Code in Existing Process
CWE-114 Process Control
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
Root/Jailbreak Detection Evasion via Hooking
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
Repo Jacking
CWE-494 Download of Code Without Integrity Check
CWE-829 Inclusion of Functionality from Untrusted Control Sphere
Install Malicious Extension
CWE-507 Trojan Horse
CWE-829 Inclusion of Functionality from Untrusted Control Sphere

About CWE-829: Inclusion of Functionality from Untrusted Control Sphere

CWE-829 is one of the established Common Weakness Enumerations that identifies a specific type of vulnerability in software. Detailed analysis of CWE-829 helps organizations understand the risks associated with this weakness and implement effective countermeasures.

Explore related attack patterns, best practices, and expert recommendations on this page. By understanding CWE-829, you can enhance your security posture and better protect your applications against exploitation.