CWE-681 Base Draft High likelihood

Incorrect Conversion between Numeric Types

This vulnerability occurs when a program converts a value from one numeric type to another (like a 64-bit integer to a 32-bit integer) and the conversion loses or misinterprets data. If these…

Definition

What is CWE-681?

This vulnerability occurs when a program converts a value from one numeric type to another (like a 64-bit integer to a 32-bit integer) and the conversion loses or misinterprets data. If these corrupted values are later used in security-critical operations—like calculating buffer sizes, checking permissions, or performing financial transactions—they can lead to crashes, incorrect behavior, or security bypasses.
At its core, this flaw is about mismatched containers. Think of pouring a gallon of water into a quart-sized bottle; you're going to lose most of the water. In programming, this 'spillage' happens during type casting or implicit conversion when a larger data type (like a `long` or `size_t`) is squeezed into a smaller one (like an `int`). The high-order bits are simply chopped off—a process called truncation—which silently turns a large number into a much smaller, and often positive, number. This is especially dangerous because the code might not crash; it just starts working with wildly incorrect data. Developers most often encounter this when dealing with memory sizes, array indices, or loop counters in code that must work across different architectures (32-bit vs. 64-bit). The primary defense is to proactively validate that a value fits within the target type's range *before* performing the conversion. Use compiler warnings, static analysis tools, and explicit checks with limits defined in headers like ``. Always assume that inputs, especially those derived from user or file data, can exceed your variable's capacity.
Real-world impact

Real-world CVEs caused by CWE-681

  • Chain: integer coercion error (CWE-192) prevents a return value from indicating an error, leading to out-of-bounds write (CWE-787)

  • Chain: in a web browser, an unsigned 64-bit integer is forcibly cast to a 32-bit integer (CWE-681) and potentially leading to an integer overflow (CWE-190). If an integer overflow occurs, this can cause heap memory corruption (CWE-122)

  • Chain: integer signedness error (CWE-195) passes signed comparison, leading to heap overflow (CWE-122)

  • Chain: signed short width value in image processor is sign extended during conversion to unsigned int, which leads to integer overflow and heap-based buffer overflow.

  • Integer truncation of length value leads to heap-based buffer overflow.

  • Size of a particular type changes for 64-bit platforms, leading to an integer truncation in document processor causes incorrect index to be generated.

How attackers exploit it

Step-by-step attacker path

  1. 1

    In the following Java example, a float literal is cast to an integer, thus causing a loss of precision.

  2. 2

    This code adds a float and an integer together, casting the result to an integer.

  3. 3

    Normally, PHP will preserve the precision of this operation, making $result = 4.8345. After the cast to int, it is reasonable to expect PHP to follow rounding convention and set $result = 5. However, the explicit cast to int always rounds DOWN, so the final value of $result is 4. This behavior may have unintended consequences.

  4. 4

    In this example the variable amount can hold a negative value when it is returned. Because the function is declared to return an unsigned int, amount will be implicitly converted to unsigned.

  5. 5

    If the error condition in the code above is met, then the return value of readdata() will be 4,294,967,295 on a system that uses 32-bit integers.

Vulnerable code example

Vulnerable Java

In the following Java example, a float literal is cast to an integer, thus causing a loss of precision.

Vulnerable Java
int i = (int) 33457.8f;
Secure code example

Secure pseudo

Secure pseudo
// Validate, sanitize, or use a safe API before reaching the sink.
function handleRequest(input) {
  const safe = validateAndEscape(input);
  return executeWithGuards(safe);
}
What changed: the unsafe sink is replaced (or the input is validated/escaped) so the same payload no longer triggers the weakness.
Prevention checklist

How to prevent CWE-681

  • Implementation Avoid making conversion between numeric types. Always check for the allowed ranges.
Detection signals

How to detect CWE-681

SAST High

Run static analysis (SAST) on the codebase looking for the unsafe pattern in the data flow.

DAST Moderate

Run dynamic application security testing against the live endpoint.

Runtime Moderate

Watch runtime logs for unusual exception traces, malformed input, or authorization bypass attempts.

Code review Moderate

Code review: flag any new code that handles input from this surface without using the validated framework helpers.

Plexicus auto-fix

Plexicus auto-detects CWE-681 and opens a fix PR in under 60 seconds.

Codex Remedium scans every commit, identifies this exact weakness, and ships a reviewer-ready pull request with the patch. No tickets. No hand-offs.

Frequently asked questions

Frequently asked questions

What is CWE-681?

This vulnerability occurs when a program converts a value from one numeric type to another (like a 64-bit integer to a 32-bit integer) and the conversion loses or misinterprets data. If these corrupted values are later used in security-critical operations—like calculating buffer sizes, checking permissions, or performing financial transactions—they can lead to crashes, incorrect behavior, or security bypasses.

How serious is CWE-681?

MITRE rates the likelihood of exploit as High — this weakness is actively exploited in the wild and should be prioritized for remediation.

What languages or platforms are affected by CWE-681?

MITRE lists the following affected platforms: C.

How can I prevent CWE-681?

Avoid making conversion between numeric types. Always check for the allowed ranges.

How does Plexicus detect and fix CWE-681?

Plexicus's SAST engine matches the data-flow signature for CWE-681 on every commit. When a match is found, our Codex Remedium agent opens a fix PR with the corrected code, tests, and a one-line summary for the reviewer.

Where can I learn more about CWE-681?

MITRE publishes the canonical definition at https://cwe.mitre.org/data/definitions/681.html. You can also reference OWASP and NIST documentation for adjacent guidance.

Related weaknesses

Weaknesses related to CWE-681

CWE-704 Parent

Incorrect Type Conversion or Cast

This vulnerability occurs when software incorrectly changes data from one type to another, leading to unexpected behavior or security flaws.

CWE-1389 Sibling

Incorrect Parsing of Numbers with Different Radices

This vulnerability occurs when software processes numeric input expecting standard decimal numbers (base 10), but fails to handle inputs…

CWE-588 Sibling

Attempt to Access Child of a Non-structure Pointer

This vulnerability occurs when code incorrectly treats a pointer to a basic data type (like an integer) as if it points to a structured…

CWE-843 Sibling

Access of Resource Using Incompatible Type ('Type Confusion')

Type confusion occurs when a program creates a resource—like a pointer, object, or variable—with one data type, but later incorrectly…

CWE-682 Can precede

Incorrect Calculation

This vulnerability occurs when software performs a calculation that produces wrong or unexpected results, which are then used to make…

CWE-192 Child

Integer Coercion Error

An integer coercion error occurs when a program incorrectly converts, extends, or truncates a number between different data types, leading…

CWE-194 Child

Unexpected Sign Extension

This vulnerability occurs when a signed number from a smaller data type is moved or cast to a larger type, causing its sign bit to be…

CWE-195 Child

Signed to Unsigned Conversion Error

This vulnerability occurs when a signed integer (which can hold negative values) is converted to an unsigned integer (which holds only…

CWE-196 Child

Unsigned to Signed Conversion Error

This vulnerability occurs when a program takes an unsigned integer and converts it directly to a signed integer. If the original unsigned…

Ready when you are

Don't Let Security
Weigh You Down.

Stop choosing between AI velocity and security debt. Plexicus is the only platform that runs Vibe Coding Security and ASPM in parallel — one workflow, every codebase.