CWE-624 - Executable Regular Expression Error
- Abstraction:Base
- Structure:Simple
- Status:Incomplete
- Release Date:2007-05-07
- Latest Modification Date:2023-06-29
Weakness Name
Executable Regular Expression Error
Description
The product uses a regular expression that either (1) contains an executable component with user-controlled inputs, or (2) allows a user to enable execution by inserting pattern modifiers.
Case (2) is possible in the PHP preg_replace() function, and possibly in other languages when a user-controlled input is inserted into a string that is later parsed as a regular expression.
Common Consequences
Scope: Confidentiality, Integrity, Availability
Impact: Execute Unauthorized Code or Commands
Related Weaknesses
CWE-77Improper Neutralization of Special Elements used in a Command ('Command Injection')High