Skip to content

Software Vulnerability Statistics 2026

Suphi Cankurt

Written by Suphi Cankurt

Key Takeaways
  • A record 48,185 CVEs were published in 2025 — roughly 131 per day — while the NVD analysis backlog means only 28% of those received full enrichment (NVD 2025, Fortress).
  • Vulnerability exploitation surged 34% to become the second most common breach vector at 20% of all breaches, with edge device targeting up eightfold year-over-year (Verizon DBIR 2025).
  • The average time to fix a security flaw has increased 47% since 2020, reaching 252 days, and half of organizations carry critical security debt with 70% originating from third-party code (Veracode 2025).
  • The global average data breach cost reached $4.88 million in 2024, but organizations using AI and automation in security saved $2.2 million per breach (IBM 2024).
  • Google GTIG tracked 90 zero-days exploited in the wild in 2025 (up from 78 in 2024), with 48% targeting enterprise infrastructure — an all-time high for enterprise-focused zero-day attacks.

A software vulnerability is a flaw or weakness in code, design, or configuration that an attacker can exploit to gain unauthorized access, steal data, or disrupt services. Vulnerabilities are cataloged using the CVE (Common Vulnerabilities and Exposures) system maintained by MITRE, scored for severity using CVSS, and classified by weakness type using CWE. In 2025, over 48,000 new CVEs were published — roughly 131 per day — making vulnerability management one of the most resource-intensive challenges in application security.

This page tracks how fast new vulnerabilities are appearing, how quickly attackers exploit them, and how long it takes organizations to patch them. I pulled data from 12 industry reports and government databases (NVD, Verizon, IBM, Veracode, Edgescan, and others) published in 2024–2026, supplemented by academic research on exploit prediction and zero-day timelines. I also added findings from three studies I ran myself in early 2026. Every statistic links to its source. For broader application security data, see my Application Security Statistics page.


Key statistics at a glance

48,185
CVEs Published in 2025
NVD 2025
20%
Breaches via Vulnerability Exploitation
Verizon DBIR 2025
$4.88M
Average Data Breach Cost
IBM 2024
252 days
Average Flaw Fix Time
Veracode 2025
90
Zero-Days Exploited in 2025
Google GTIG 2025
1,484
CISA KEV Catalog Entries
CISA 2025

New vulnerability disclosures keep climbing. The CVE database now holds over 300,000 entries, and 2025 broke every previous record.

48,185 CVEs published in 2025, averaging 131 new disclosures per day, with only 28% receiving full NVD analysis

How many CVEs were published in 2025?

  • 48,185 CVEs were published in 2025, averaging roughly 131 new disclosures per day — up from ~113/day in 2024 — The Stack 2025
  • 40,000+ CVEs were published in 2024, itself a record at the time — CVE Details
  • The CVE database surpassed 300,000 total recorded vulnerabilities by December 2025, reaching approximately 310,000 entries — NVD Dashboard

Severity distribution

  • Critical-severity CVEs accounted for 7.4% of all 2025 disclosures, down from 12.8% in 2024 — Zafran 2025
  • High-severity CVEs declined to 30% in 2025, down from 35.2% the year before — Zafran 2025
  • Despite the lower percentages, the raw count of critical and high-severity CVEs still grew because total volume increased so substantially

NVD analysis backlog

  • Only 28% of newly disclosed CVEs in 2025 received full NVD enrichment (CVSS score, CWE classification, CPE data), down from 46.2% in 2024 — Fortress Information Security
  • 54,914 CVEs from 2024–2025 remain in the NVD queue awaiting full analysis — Fortress Information Security
  • For organizations that rely on NVD for severity scores, this backlog leaves a blind spot: recent vulnerabilities without CVSS data are harder to prioritize

Most common vulnerability types

MITRE’s CWE Top 25 identifies the weakness categories behind the largest share of real-world CVEs. The 2025 list analyzed 39,080 CVE records for vulnerabilities reported between June 2024 and June 2025.

CWE Top 25 highlights (2025)

  • Cross-site scripting (CWE-79) holds the #1 position — MITRE CWE Top 25 2025
  • SQL injection (CWE-89) moved up to #2 — MITRE CWE Top 25 2025
  • Cross-site request forgery (CWE-352) climbed to #3 — MITRE CWE Top 25 2025
  • Use-after-free (CWE-416) ranked #7 and code injection (CWE-94) ranked #10, both moving up one spot from 2024 — Infosecurity Magazine 2025
  • Six new entries joined the 2025 list including classic buffer overflow, stack-based buffer overflow, heap-based buffer overflow, improper access control, authorization bypass through user-controlled key, and allocation of resources without limits — CISA 2025

CISA KEV weakness types

  • OS command injection (CWE-78) was the most common weakness among vulnerabilities added to CISA’s Known Exploited Vulnerabilities catalog in 2025, appearing in 18 of 245 entries — Cyble 2025
  • Deserialization of untrusted data (CWE-502) came second with 14 appearances — Cyble 2025
  • Path traversal (CWE-22) moved to third place with 13 entries — Cyble 2025

SAST and DAST scanners catch most of these weakness categories during development. For how the OWASP Top 10 maps to testing in practice, see my vulnerability management lifecycle guide.


Exploitation in the wild

Disclosure is one thing. What matters to defenders is how fast attackers turn CVEs into working exploits, and how many they actually bother with.

Attackers weaponize vulnerabilities in 19.5 days on average while defenders take 30.6 days to deploy patches, creating an 11-day exposure window

How often are vulnerabilities used in data breaches?

  • Exploitation of vulnerabilities accounted for 20% of all breaches in 2025, making it the second most common initial access vector after credential abuse — Verizon DBIR 2025
  • This represents a 34% year-over-year increase in vulnerability exploitation as a breach vector — Verizon DBIR 2025
  • In espionage-motivated breaches, vulnerability exploitation as an initial access vector jumped to 70%Verizon DBIR 2025

How fast are vulnerabilities exploited after disclosure?

  • 28.96% of vulnerabilities added to CISA’s KEV catalog in 2025 were exploited on or before the day their CVE was published, up from 23.6% in 2024 — VulnCheck 2026
  • For critical edge-device vulnerabilities (firewalls, VPN gateways), the median time between disclosure and mass exploitation was zero daysVerizon DBIR 2025
  • Attackers weaponize vulnerabilities in an average of 19.5 days, while organizations average 30.6 days to deploy patches — creating an 11-day exposure window — Qualys TruRisk 2023
  • Attacks targeting website vulnerabilities reached 6.29 billion in 2025, up 56% from 4 billion in 2024 — Security Boulevard 2026

CISA KEV catalog

  • The CISA KEV catalog grew to 1,484 entries by end of 2025, up from 1,239 at end of 2024 — a nearly 20% increaseCyble 2025
  • CISA added 245 vulnerabilities in 2025, a 30%+ increase over the trend seen in 2023 and 2024 — The Cyber Express 2025
  • 304 of 1,484 KEV entries (20.5%) have been exploited by ransomware groups — Cyble 2025
  • Microsoft led all vendors with 39 KEV additions in 2025, up from 36 in 2024 — Cyble 2025

Edge device targeting

  • 22% of all vulnerability exploitation breaches in 2025 targeted edge infrastructure (firewalls, VPN concentrators, remote access gateways) — Verizon DBIR 2025
  • This represents an eightfold increase compared to the previous year — Verizon DBIR 2025
  • Only 54% of perimeter-device vulnerabilities were fully remediated within the year — Verizon DBIR 2025

Zero-day exploitation

Zero-days are the flaws exploited before a patch exists. Google’s Threat Intelligence Group (GTIG) tracks these more comprehensively than anyone else.

90 zero-day vulnerabilities exploited in 2025 by vendor: Microsoft 25, Google 11, Apple 8, Cisco 4, others 42, with 48% targeting enterprise software

2025 zero-day landscape

  • Google GTIG tracked 90 zero-day vulnerabilities exploited in the wild in 2025, up from 78 in 2024 and within the 60–100 range established over four years — Google Cloud Blog 2025
  • 43 zero-days (48%) targeted enterprise software and appliances — both the raw number and proportion reached all-time highs — Google Cloud Blog 2025
  • Browser-based exploitation fell to historical lows, while operating system vulnerabilities saw increased abuse — Google Cloud Blog 2025
  • Microsoft accounted for 25 of the 90 zero-days, followed by Google (11), Apple (8), and Cisco (4) — SecurityWeek 2025

Threat actors

  • Commercial surveillance vendors (CSVs) were the most active users of zero-day exploits in 2025, surpassing traditional state-sponsored espionage groups for the first time — Google Cloud Blog 2025
  • Ransomware attacks rose 37% year-over-year and were present in 44% of breaches — Verizon DBIR 2025
  • 24 vulnerabilities added to CISA KEV in 2025 were marked as exploited by ransomware groups specifically — Cyble 2025

Academic research backs this up. Jacobs et al. (2023) built an exploit prediction system using input from 170+ experts and achieved 82% better accuracy than older models at predicting which vulnerabilities would actually get weaponized. The implication: the same signals attackers rely on could help defenders prioritize, too.


Remediation timelines

Discovering a vulnerability is the easy part. Fixing it before someone exploits it is where most organizations struggle. Fix times are getting longer on average, but the best-performing teams show it doesn’t have to be that way.

Average vulnerability fix time is 252 days (up 47% since 2020), with top performers fixing in 5 weeks while bottom performers take over a year

How long does it take to fix a vulnerability?

  • The average time to fix a security flaw has increased 47% since 2020, rising from 171 days to 252 daysVeracode 2025
  • Critical application vulnerabilities take an average of 74.3 days to remediate — Edgescan 2025
  • Internet-facing critical vulnerabilities are fixed faster at 35 days, while host/cloud critical vulnerabilities average 61 daysEdgescan 2025
  • Perimeter-device vulnerabilities take a median of 32 days to patch — Verizon DBIR 2025
  • Windows and Chrome vulnerabilities are patched in 17.4 days on average — roughly twice as fast as other applications — Qualys TruRisk 2023

What percentage of vulnerabilities go unpatched?

  • 45.4% of enterprise vulnerabilities remain unpatched after 12 months, with 17.4% being high or critical severity — Edgescan 2025
  • Weaponized vulnerabilities are patched only 57.7% of the time — Qualys TruRisk 2023
  • A 2019 Ponemon/ServiceNow study found that 60% of breaches involved exploiting known vulnerabilities where a patch was already available — a trend consistent with Verizon DBIR’s ongoing finding that patching delays remain a top risk factor — Ponemon 2019
  • Only 54% of perimeter-device vulnerabilities were fully remediated within the year — Verizon DBIR 2025

Maturity gap

  • Top-performing organizations resolve over 10% of their flaws monthly and remediate half within 5 weeksVeracode 2025
  • Lower-performing organizations address less than 1% of flaws monthly and take over a year to reach the same milestone — Veracode 2025
  • Leading organizations have flaws in fewer than 43% of applications, while lagging organizations exceed 86%Veracode 2025
  • Software companies achieve the fastest MTTR at 63 days, while the construction sector lags at 104 daysEdgescan 2025

First-party vs third-party flaws

Most modern applications contain more dependency code than original code. That shifts the vulnerability math: your risk profile is largely shaped by libraries you didn’t write.

First-party vs third-party vulnerability sources: 92% breached from in-house code, 97% of codebases use open-source, 70% of security debt from dependencies

Open-source and supply chain exposure

  • 97% of commercial codebases contain open-source components — Black Duck OSSRA 2025
  • 81% of those codebases have at least one high- or critical-risk open-source vulnerability — Black Duck OSSRA 2025
  • 80% of application dependencies remain un-updated for over a year — Sonatype 2024
  • 70% of accumulated security debt originates from third-party library flaws — Veracode 2025

In-house application vulnerabilities

Third-party breach impact

  • Third-party involvement in breaches has doubled to 30%Verizon DBIR 2025
  • 50% of organizations carry critical security debt, defined as unresolved high-exploitability vulnerabilities lingering for years — Veracode 2025
  • Less than 17% of applications in leading organizations carry security debt, compared with over 67% in lagging organizations — Veracode 2025

For tools that track open-source risk, see my SCA tools comparison. For first-party code scanning, see SAST tools and DAST tools.


Cost of vulnerabilities

When vulnerabilities get exploited, the bill arrives. These numbers tend to get executives’ attention faster than any CVSS score.

How much does a data breach cost?

  • The global average cost of a data breach reached $4.88 million in 2024 — a 10% year-over-year increase, the largest jump since the pandemic — IBM 2024
  • 70% of breached organizations reported significant or very significant operational disruption — IBM 2024
  • Stolen/compromised credentials was the most common initial attack vector at 16% of breaches, followed by vulnerability exploitation — IBM 2024
  • 40% of breaches involved data stored across multiple environments, and over a third involved shadow data in unmanaged sources — IBM 2024
  • Intellectual property theft costs jumped nearly 11% to $173 per recordIBM 2024

Detection and containment

  • On average, it took organizations 194 days to identify a breach and an additional 64 days to contain it — totaling 258 days from intrusion to resolution, a 7-year low — IBM 2024

Cost reduction through security investment

  • Organizations with high DevSecOps adoption saw breach costs nearly $1.7 million lower than those without — IBM 2024
  • Extensive use of AI and automation in security cut breach costs by an additional $2.2 millionIBM 2024
  • 26% more organizations faced severe security staffing shortages in 2024 than the prior year, with those understaffed organizations seeing $1.76 million higher breach costs — IBM 2024
For more on how DevSecOps practices reduce breach costs and speed up remediation, see my DevSecOps Statistics page with 60+ data points on adoption, market growth, and CI/CD security trends.

My own research

I ran three original studies in early 2026 that produced vulnerability data worth noting here.

AI-generated code security

I tested 534 code samples from six LLMs and found a 25.1% vulnerability rate — meaning roughly one in four AI-generated code snippets contained a confirmed security flaw. The most common weaknesses were CWE-79 (XSS) and CWE-89 (SQL injection), the same categories that top MITRE’s CWE Top 25. Full findings: AI-Generated Code Security Study 2026.

Security headers adoption

I scanned 10,000 websites and found that only 27.3% deploy a Content-Security-Policy header, and just 11.2% achieve an A+ grade using Mozilla Observatory methodology. The median security header grade was D. Full findings: Security Headers Adoption Study 2026.

Open source AppSec tool health

I evaluated 100+ open-source security tools across 10 categories using a composite health score (stars, contributors, release frequency, issue response, downloads). Four projects scored below 30/100, indicating risk of abandonment. Full findings: State of Open Source AppSec Tools 2026.

For a consolidated view of all original research findings, see my Application Security Statistics page.

Sources & methodology

Every number on this page links to a published report, government database, or academic paper. If I cannot trace a statistic to a primary source, I do not include it.

Government and standards databases:

Industry reports:

Academic research:

Original research (AppSec Santa):

Frequently Asked Questions

How many CVEs were published in 2025?
A record 48,185 CVEs were published in 2025, averaging roughly 131 new vulnerability disclosures per day. This represents a significant increase from 2024’s approximately 40,000 CVEs and continues a multi-year upward trend in vulnerability disclosure volume.
What is the average time to remediate a software vulnerability?
It depends on severity and organization maturity. Edgescan’s 2025 report found a mean time to remediate (MTTR) of 74.3 days for critical application vulnerabilities. Veracode reports the overall average fix time has increased to 252 days in 2025, up 47% since 2020. Top-performing organizations fix half their flaws in five weeks, while lower performers take over a year.
What percentage of data breaches involve vulnerability exploitation?
According to Verizon’s 2025 DBIR, exploitation of vulnerabilities accounts for 20% of all data breaches, making it the second most common initial access vector after credential abuse. This represents a 34% increase year-over-year.
How much does a data breach cost on average?
The global average cost of a data breach reached $4.88 million in 2024, according to IBM’s Cost of a Data Breach Report. Organizations with high DevSecOps adoption saved nearly $1.7 million per breach, and extensive use of AI and automation in security cut costs by an additional $2.2 million.
What are the most common software vulnerability types?
According to MITRE’s 2025 CWE Top 25, cross-site scripting (XSS) ranks first, followed by SQL injection in second place and cross-site request forgery (CSRF) in third. The list is based on analysis of 39,080 CVE records for vulnerabilities reported between June 2024 and June 2025.
How many zero-day vulnerabilities were exploited in 2025?
Google’s Threat Intelligence Group (GTIG) tracked 90 zero-day vulnerabilities exploited in the wild in 2025, up from 78 in 2024. Nearly half (48%) targeted enterprise software and appliances, reaching an all-time high for enterprise-focused zero-day exploitation.
Can I cite these statistics?
Yes. Please cite as: ‘Software Vulnerability Statistics 2026, AppSec Santa (appsecsanta.com).’ Every data point on this page links to its original source report.
Suphi Cankurt

10+ years in application security. Reviews and compares 210 AppSec tools across 11 categories to help teams pick the right solution. More about me →