logo
Home/CWEs/CWE-624/

CWE-624 - Executable Regular Expression Error

  • Abstraction:Base
  • Structure:Simple
  • Status:Incomplete
  • Release Date:2007-05-07
  • Latest Modification Date:2023-06-29

Weakness Name

Executable Regular Expression Error

Description

The product uses a regular expression that either (1) contains an executable component with user-controlled inputs, or (2) allows a user to enable execution by inserting pattern modifiers.

Case (2) is possible in the PHP preg_replace() function, and possibly in other languages when a user-controlled input is inserted into a string that is later parsed as a regular expression.

Common Consequences

Scope: Confidentiality, Integrity, Availability

Impact: Execute Unauthorized Code or Commands

Related Weaknesses

CWE-77Improper Neutralization of Special Elements used in a Command ('Command Injection')High