A Beginner’s Guide to the CVE Database

A Beginner’s Guide to the CVE Database

Keeping websites and applications secure starts with knowing which vulnerabilities exist, how severe they are, and whether they affect your stack. That’s exactly where the CVE program shines. Below, we’ll cover some CVE fundamentals, including what they are, how to search and understand the data, and how to translate this information into actionable steps.

Introduction to the CVE database

So, what is CVE?

CVE stands for Common Vulnerabilities and Exposures, a community-driven program that assigns unique identifiers to publicly known vulnerabilities. Each identifier (or “CVE ID”) is a consistent, vendor‑neutral label that makes it easier for the entire ecosystem of vendors, researchers, and tools to talk about the same issue without confusion.

Learn more: the official CVE Program and its Program Organization.

CVE IDs themselves don’t include all the scoring or product details. For enriched data, most practitioners also consult the U.S. NIST’s National Vulnerability Database (NVD), though, as covered below, enrichment increasingly appears in the CVE record itself, and NVD’s enrichment coverage changed significantly in 2026.

Importance of the CVE database in cybersecurity

Why CVE matters:

  • Shared language: The same CVE ID appears across vendor advisories, scanners, and patch notes.
  • Faster triage: Teams can quickly filter vulnerabilities by severity, product, or exploitability.
  • Compliance-ready: Many frameworks (e.g., PCI DSS, ISO 27001) expect a repeatable vulnerability management process. CVE is the foundation.
  • Better coordination: From CMS plugins and themes to libraries and OS packages, CVE IDs connect the dots across your software supply chain.

How to access and search the CVE database

Navigating the CVE website

Start with two primary destinations:

  1. CVE.org Search: Browse canonical CVE records, their status, and references.
  2. NVD: Dive deeper into enrichment like CVSS scores, CPE product identifiers, configurations, and impact metrics.

It’s worth knowing that the line between these two has blurred. Modern CVE records increasingly include CVSS scores, CWE weakness types, and affected-product data supplied directly by the CNA. In addition, CISA’s “Vulnrichment” project, operating as an Authorized Data Publisher (ADP), adds enrichment such as CVSS, CWE, and SSVC decision points straight into the CVE record. So a record on CVE.org is often enriched in its own right, not just an “ID, status, and references” entry.

For WordPress site owners, add one ecosystem-focused resource:

On CVE.org, use the top search bar for a product name (like “OpenSSL”) or a CVE ID. Each CVE page links out to references such as vendor advisories and sometimes to NVD.

CVE.org search

On NVD, the Vulnerabilities section provides an advanced search with filters for keywords, vendors, products, versions, CVSS ranges, and dates. You’ll also find product taxonomy under the CPE Directory.

NVD advanced search

Search techniques for finding CVEs

Here are some methods for tracking down CVEs:

  • By product & vendor: Search “vendor product” (like “WordPress WooCommerce”) to find relevant results across versions.
  • By CVE ID: If you already have an identifier from a vendor bulletin or scanner, paste it directly.
  • Filter by severity: Use NVD’s CVSS filter to prioritize critical/high items.
  • Filter by date: Limit results to the last 7/30/90 days to focus on fresh issues.
  • Use CPE for precision: If your scanner or inventory uses CPE, search that exact string to narrow to specific products/versions.
  • Check known exploited: Compare findings with CISA’s Known Exploited Vulnerabilities (KEV) Catalog to spot vulnerabilities actively exploited in the wild.
  • Prioritize likely exploitation: Consider FIRST’s EPSS (Exploit Prediction Scoring System) to weigh how likely a vulnerability is to be exploited soon.
  • Use SSVC for decision-focused triage: CISA’s Stakeholder-Specific Vulnerability Categorization (SSVC) decision points help you decide whether to act now, schedule a fix, or simply track an issue.

Understanding CVE identifiers

Structure and format of CVE identifiers

A CVE ID follows this pattern:

CVE-YYYY-NNNNN
  • YYYY is the year the ID was reserved or assigned (not necessarily the discovery or patch year).
  • NNNNN is a unique number. Since 2014, the number of digits is variable to accommodate growth (e.g., CVE-2019-1234, CVE-2024-1234567 are both valid).

How CVE identifiers are assigned

CVE IDs are assigned by CVE Numbering Authorities (CNAs) – vendors, research orgs, coordinators, and other partners authorized under the CVE Program. A CNA can reserve an ID early (you’ll see the status RESERVED) and later publish details. Sometimes entries are REJECTED if they don’t meet criteria, or DISPUTED when there’s disagreement about validity or impact.

Since 2024, the CVE Program has also recognized Authorized Data Publishers (ADPs) – trusted parties, such as CISA, that can add enrichment to existing CVE records without altering the original CNA’s data. CISA’s Vulnrichment is currently the most prominent ADP.

You can learn more about CNAs here.

Analyzing CVE entries

Components of a CVE entry

On CVE.org you’ll typically find:

  • CVE ID & state (PUBLISHED, RESERVED, REJECTED).
  • Description of the vulnerability.
  • References (links to vendor advisories, issue trackers, or research posts).
  • Enrichment data, when provided: Many records now also carry CVSS scores, CWE identifiers, affected-product information, and CISA SSVC decision points contributed by the CNA or by an ADP.

On NVD, entries often include additional fields for triage:

  • CVSS metrics – NVD now publishes CVSS v4.0 scores alongside CVSS v3.1 for newly analyzed CVEs (v4.0 was released by FIRST in November 2023). CVSS v3.1 remains the most widely used version and the primary score on historical records, which are not being retroactively rescored.
  • CWE (Common Weakness Enumeration) to classify the underlying weakness.
  • CPE configurations – Which vendors/products/versions are affected.
  • Last modified date – Important for re-reviews and scoring updates.

Keep in mind, NVD’s enrichment model has recently changed. Faced with a 263% increase in CVE submissions between 2020 and 2025, NIST announced this past April that it will no longer enrich every CVE. The NVD now follows a risk-based prioritization model, focusing analyst effort on CVEs that are in CISA’s KEV catalog, affect federal or critical software, or are otherwise high-impact.

Other CVEs remain listed but are labeled “lowest priority.” NIST also retired the old “Deferred” status in favor of “Not Scheduled,” moved its large pre–March 1, 2026 backlog into that category, and will generally stop adding its own CVSS score when a CNA has already provided one. Practically, this means you can no longer assume every CVE will carry an NVD-generated CVSS score or product mapping, so check the CNA’s data and CISA’s Vulnrichment alongside NVD.

Reading a CVSS vector:

NVD CVSS metrics
Example of CVSS metrics on NVD

A vector like AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (often a 9.8–10.0) encodes the attack conditions:

Attack Vector, Attack Complexity, Privileges Required, User Interaction, Scope, and impact on Confidentiality/Integrity/Availability.

Learn more at the CVSS spec: first.org/cvss.

Risk assessment based on CVE information

Use CVE data as inputs rather than the final word. Consider:

  1. Exploitability & activity
    • Is it on CISA KEV? Prioritize immediately if yes.
    • Is public exploit code likely or confirmed? EPSS can inform likelihood.
    • Does the CVE record carry CISA SSVC decision points? They translate exploitation status, technical impact, and automatability into a clear act/track/attend recommendation.
  2. Exposure & applicability
    • Does the vulnerability affect software you actually run (check versions/CPE)?
    • Is the vulnerable service internet-exposed?
    • Can a WAF or configuration change mitigate while you patch?
  3. Impact severity
    • CVSS base score and vector indicate how damaging exploitation would be.
    • Vendor advisories sometimes provide context that differs from NVD scoring, so read both.
    • Because NVD may not score every CVE, treat the CNA-provided score in the CVE record (and any CISA ADP enrichment) as a primary source, not just a fallback.
  4. Patch & workaround availability
    • Is a fixed version available? Are there temporary mitigations?
    • Will mitigating controls (e.g., WAF rules, feature flags) meaningfully reduce risk?
  5. Business context
    • Consider data sensitivity, regulatory obligations, and uptime requirements.
    • Prioritize vulnerabilities on critical customer-facing assets.

Best practices for using the CVE database

Regular monitoring of CVE updates

  • Subscribe to feeds and APIs:
  • Watch your stack:
    • Maintain a living inventory (CMS, plugins/themes, web server, PHP, database, OS packages, third‑party libraries).
    • Map products to CPEs where possible to automate matching.
  • Set review cadence:
    • Daily/weekly triage for internet-facing systems.
    • Emergency process for critical RCEs or KEV entries.
  • WordPress-focused signal:

Integrating CVE data into security policies

Turn CVE insights into consistent actions:

  • Severity SLAs: For example, patch CVSS ≥ 9.0 within 24–72 hours; KEV items “asap”; 7.0–8.9 within one or two patch cycles.
  • Exploitability signal: Escalate based on EPSS probability, CISA SSVC decision points, or confirmed exploitation.
  • Don’t single-source your data: With NVD now enriching selectively, build prioritization on multiple inputs (the CNA’s score in the CVE record, CISA Vulnrichment, KEV, EPSS, and vendor advisories) rather than waiting on an NVD score that may never arrive.
  • Change management: Use staging, backups, and rollback plans (especially for CMS/plugin updates).
  • Documented exceptions: If you must defer a patch, record risk acceptance with compensating controls (e.g., WAF rules, access restrictions).
  • SBOMs & SCA: Use a Software Bill of Materials and software composition analysis to catch library-level CVEs across builds.
  • Training & playbooks: Ensure operations knows how to read CVE/NVD records, validate applicability, and implement mitigations quickly.
  • OWASP alignment: See OWASP resources on vulnerability management and patching process: OWASP Top 10 and the Vulnerability Management project.

Conclusion and further resources

CVE is the industry’s common dictionary for vulnerabilities. Pair CVE.org for canonical records with NVD for scoring and product mappings, and add CISA KEV and EPSS to judge urgency. If you manage WordPress sites, integrate Patchstack to stay up to date on plugin and theme advisories. Build automation around your asset inventory, feeds, and SLAs so you can detect, triage, and mitigate faster.

Remember, enriched data now lives in the CVE record itself (via CNAs and ADPs like CISA Vulnrichment), while NVD has shifted to analyzing the highest-risk issues first. Treat no single source as complete, and lean on KEV, EPSS, and SSVC to cut through the rising volume of CVEs.

Useful links to keep handy:

Frequently asked questions

Is the CVE program still active and funded in 2026?

Yes. Despite a contract lapse that briefly threatened operations in April 2025, CISA extended funding, and as of early 2026 the program has reported a more stable, longer-term funding arrangement. CVE IDs continue to be assigned and published without interruption.

What’s the difference between CVE and the NVD?

A CVE record is the canonical, vendor-neutral entry for a vulnerability published through the CVE Program (operated by MITRE, sponsored by CISA). The National Vulnerability Database (NVD), run by NIST, is a separate U.S. government database that has historically added “enrichment” such as CVSS scores and product mappings on top of CVE records. The two are related but operated by different organizations.

Why do some CVEs have no CVSS score or show a “Not Scheduled” status?

Since April 2026, NIST’s NVD uses a risk-based model and no longer enriches every CVE. Lower-priority CVEs, and most of the backlog published before March 1, 2026, are labeled “Not Scheduled” and may lack an NVD-generated score. The CVE record itself, however, often contains a CVSS score supplied by the CNA or by CISA’s Vulnrichment.

Is CVSS v4.0 replacing CVSS v3.1?

Not entirely, and not quickly. CVSS v4.0 is now published by NVD alongside v3.1 for new CVEs, and many vendors have adopted it. But v3.1 remains widely used, historical records are not being rescored, and most organizations will need to handle both versions for the next several years.

Where can I find a CVSS score if the NVD hasn’t enriched a CVE?

Check the CVE record on CVE.org: many CNAs now include a CVSS score directly, and CISA’s Vulnrichment (an Authorized Data Publisher) adds CVSS, CWE, and SSVC data to many records. Vendor security advisories are another reliable source.

How Sucuri can help

If you manage a website or CMS, you don’t have to navigate CVEs alone:

Security is a journey. Use CVE data to know what matters, and pair it with layered defenses and disciplined patching to keep your sites resilient.

Chat with Sucuri

You May Also Like