LIVE NEWSROOM · --:-- · May 25, 2026
A LIBRARY FOR SECURITY RESEARCHERS

CWE WEAKNESSES  /  CWE-681

CWE-681

Incorrect Conversion between Numeric Types

Base EXPLOIT LIKELIHOOD: HIGH

What it is

When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that produces unexpected values. If the resulting values are used in a sensitive context, then dangerous behaviors may occur.

Impact

Other, IntegrityUnexpected State, Quality Degradation

Mitigations

  • [Implementation] Avoid making conversion between numeric types. Always check for the allowed ranges.

Real-world CVE examples

  • CVE-2022-2639 — Chain: integer coercion error (CWE-192) prevents a return value from indicating an error, leading to out-of-bounds write (CWE-787)
  • CVE-2021-43537 — Chain: in a web browser, an unsigned 64-bit integer is forcibly cast to a 32-bit integer (CWE-681) and potentially leading to an integer overflow (CWE-190). If
  • CVE-2007-4268 — Chain: integer signedness error (CWE-195) passes signed comparison, leading to heap overflow (CWE-122)
  • CVE-2007-4988 — Chain: signed short width value in image processor is sign extended during conversion to unsigned int, which leads to integer overflow and heap-based buffer ove
  • CVE-2009-0231 — Integer truncation of length value leads to heap-based buffer overflow.
  • CVE-2008-3282 — Size of a particular type changes for 64-bit platforms, leading to an integer truncation in document processor causes incorrect index to be generated.

Related weaknesses

Test & detect

Browse all common weaknesses, check related exploited CVEs, or map to ATT&CK techniques.

Source: MITRE CWE. View on cwe.mitre.org →

Scroll to Top