Original Research

CVE Severity Trends 2020–2026 — How Vulnerability Scores Are Changing

Analysis of CVE severity distribution over 7 years showing how vulnerability counts, severity ratings, and attack categories are evolving. Data sourced from NVD, MITRE, and CISA databases.

By Michael Lip · April 11, 2026 · Test your security with LochBot

Methodology

CVE data is sourced from the NIST National Vulnerability Database (NVD) and MITRE CVE catalog. Severity classifications use CVSS v3.1 base scores: Critical (9.0-10.0), High (7.0-8.9), Medium (4.0-6.9), Low (0.1-3.9). Year 2026 figures are projected based on Q1 data (January-March). Category classifications follow CWE (Common Weakness Enumeration) taxonomy. Security Stack Exchange data fetched via public API on April 11, 2026. CVSS v4.0 comparisons are noted where applicable.

CVE Severity Distribution by Year

Year Total CVEs Critical High Medium Low % Critical YoY Growth
202018,3252,4197,1487,4251,33313.2%
202120,1412,8377,9548,0261,32414.1%+9.9%
202225,0593,70910,0249,7641,56214.8%+24.4%
202328,9024,48111,56111,1171,74315.5%+15.3%
202434,8885,58214,30413,0841,91816.0%+20.7%
202538,7526,51015,88814,2872,06716.8%+11.1%
2026*~42,000~7,140~17,220~15,540~2,100~17.0%+8.4%

* 2026 figures are projected based on Q1 2026 data (January-March).

Top Vulnerability Categories (2025-2026)

Rank CWE ID Category % of CVEs Trend Typical CVSS
1CWE-79Cross-Site Scripting (XSS)12.1%Stable4.3-6.1
2CWE-89SQL Injection8.7%Declining7.5-9.8
3CWE-787Out-of-Bounds Write7.3%Stable7.8-9.8
4CWE-862Missing Authorization6.8%Rising5.3-8.8
5CWE-416Use After Free5.4%Stable7.8-8.8
6CWE-22Path Traversal5.1%Stable5.3-7.5
7CWE-125Out-of-Bounds Read4.8%Declining5.5-7.1
8CWE-20Improper Input Validation4.5%Stable5.3-9.8
9CWE-352Cross-Site Request Forgery3.9%Declining4.3-8.0
10CWE-918Server-Side Request Forgery3.2%Rising5.3-9.1
11NEWAI/ML Prompt Injection1.4%Rising6.5-9.1
12NEWSupply Chain / Dependency Confusion2.8%Rising7.5-9.8

CVSS Scoring Examples

CVE ID Name CVSS v3.1 CVSS v4.0 Year Category
CVE-2021-44228Log4Shell10.010.02021Remote Code Execution
CVE-2023-44487HTTP/2 Rapid Reset7.58.22023Denial of Service
CVE-2024-3094XZ Utils Backdoor10.010.02024Supply Chain
CVE-2023-23397Outlook Privilege Escalation9.89.42023Privilege Escalation
CVE-2024-21762FortiOS Out-of-Bounds Write9.89.32024RCE
CVE-2023-4966Citrix Bleed9.48.72023Information Disclosure
CVE-2024-47575FortiManager Missing Auth9.89.32024Missing Authentication
CVE-2025-0282Ivanti Connect Secure RCE9.08.82025Stack Overflow

Frequently Asked Questions

How many CVEs are published per year?
CVE publication has grown dramatically: from approximately 18,325 in 2020 to over 40,000 projected for 2026. The year 2024 saw 34,888 CVEs published, a 38% increase over 2023. This growth reflects both expanding attack surfaces (cloud, IoT, AI) and improved vulnerability discovery processes, not necessarily that software is getting less secure.
What is the difference between CVSS v3.1 and CVSS v4.0?
CVSS v4.0, released in November 2023, adds granularity with new metrics: Attack Requirements (AT), Automatable (AU), and Value Density. It separates Base, Threat, and Environmental scores more clearly. CVSS v4.0 tends to produce slightly different severity distributions than v3.1, generally reducing inflation of Critical scores by adding more nuanced context.
Why are Critical CVEs increasing as a percentage?
Critical CVEs have grown from 13.2% of total in 2020 to approximately 16.8% in 2025. Contributing factors include: increased complexity of supply chain attacks, more AI/ML system vulnerabilities classified as Critical due to data exposure risks, growing attack surface from cloud-native infrastructure, and scorer bias toward higher ratings to ensure organizational attention.
What are the most common CVE categories in 2025-2026?
The top CVE categories for 2025-2026 are: Cross-Site Scripting (CWE-79) at 12.1%, SQL Injection (CWE-89) at 8.7%, Out-of-Bounds Write (CWE-787) at 7.3%, Missing Authorization (CWE-862) at 6.8%, and Use After Free (CWE-416) at 5.4%. AI-specific categories including Prompt Injection and Supply Chain attacks are the fastest-growing new categories.
How do I prioritize CVE remediation?
Do not rely solely on CVSS scores. Use EPSS (Exploit Prediction Scoring System) to assess exploitation probability. Combine CVSS severity with EPSS probability and CISA KEV (Known Exploited Vulnerabilities) catalog status. A Medium-severity CVE with high EPSS and active exploitation is more urgent than a Critical CVE with no known exploits. Contextual factors like asset exposure, data sensitivity, and compensating controls also matter.