CWE-200: Information Exposure

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

1,066
Total CVEs
92
Critical
389
High
6.5
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
133
2025
470
2024
275
2023
92
2022
41

Top Affected Vendors

1 Apple 81
2 Microsoft 46
3 Huawei 34
4 Apache 25
5 Oracle 19
6 Google 15
7 Debian 12
8 Splunk 9
9 Mozilla 9
10 Netgear 8

All Information Exposure CVEs (1,066)

CVE-2024-8106
6.5

This vulnerability in the WP Extended WordPress plugin allows authenticated attackers with Subscriber-level access or higher to extract sensitive user...

Sep 4, 2024
CVE-2024-43251
6.5

The Bit Form Pro WordPress plugin versions up to 2.6.4 contain an authenticated sensitive data exposure vulnerability. Authenticated users can access ...

Aug 26, 2024
CVE-2022-45449
6.5

Acronis Agent in Cyber Protect 15 has excessive privileges that can lead to sensitive information disclosure. This affects Acronis Cyber Protect 15 in...

Jul 16, 2024
CVE-2024-0093
6.5

This vulnerability in NVIDIA GPU software for Linux allows unauthorized actors to access sensitive information through the GPU driver. It affects Linu...

Jun 13, 2024
CVE-2024-34002
6.5

This vulnerability allows a Moodle user with specific permissions to execute local file includes in misconfigured shared hosting environments. Attacke...

May 31, 2024
CVE-2024-34004
6.5

This vulnerability allows a Moodle user with wiki restore permissions and direct server access to execute local file includes in misconfigured shared ...

May 31, 2024
CVE-2021-44534
6.5

CVE-2021-44534 allows unauthenticated attackers to read arbitrary files on vulnerable systems by exploiting insufficient input filtering. This can lea...

May 31, 2024
CVE-2026-28682
6.4

This vulnerability in Gokapi's upload status SSE implementation allows authenticated users to see global upload state and file IDs from other users. I...

Mar 6, 2026
CVE-2025-11670
6.4

ManageEngine ADManager Plus versions before 8025 expose NTLM hashes to technicians with 'Impersonate as Admin' privileges. This allows authenticated t...

Dec 15, 2025
CVE-2024-21902
6.4

This CVE describes an incorrect permission assignment vulnerability in QNAP operating systems that allows authenticated users to read or modify critic...

May 21, 2024
CVE-2025-15065
6.3

This vulnerability in KESS Enterprise on Windows allows unauthorized actors to access sensitive information, modify services, and escalate privileges ...

Dec 29, 2025
CVE-2025-64703
6.3

MaxKB versions before 2.3.1 contain a sandbox escape vulnerability in the Python tool module that allows authenticated users to access sensitive infor...

Nov 13, 2025
CVE-2024-8553
6.3

This vulnerability in Foreman's report template loader macros allows authenticated users with template permissions to bypass authorization and read se...

Oct 31, 2024
CVE-2024-20491
6.3

This vulnerability in Cisco Nexus Dashboard Insights allows attackers who obtain tech support files to view remote controller admin credentials in cle...

Oct 2, 2024
CVE-2024-41109
6.3

This vulnerability in Pimcore's Admin Classic Bundle exposes sensitive system information to authenticated users. By accessing the /admin/index/statis...

Jul 30, 2024
CVE-2020-25836
6.3

This vulnerability in OpenText NetIQ Directory and Resource Administrator allows unauthorized access to sensitive information. It affects organization...

Jul 16, 2024
CVE-2025-68959
6.2

This CVE describes a permission verification bypass vulnerability in the media library module that allows unauthorized access to protected media conte...

Jan 14, 2026
CVE-2026-20821
6.2

This Windows Remote Procedure Call vulnerability allows unauthorized local attackers to access sensitive information from system memory. It affects Wi...

Jan 13, 2026
CVE-2025-66304
6.2

Grav CMS versions before 1.8.0-beta.27 expose password hashes to users with read access to the admin panel's user management section. This allows atta...

Dec 1, 2025
CVE-2025-58305
6.2

An authentication bypass vulnerability in the Gallery app allows unauthorized access to protected content. This affects Huawei device users who have t...

Nov 28, 2025
CVE-2025-58278
6.2

This CVE describes an identity authentication bypass vulnerability in Huawei's Gallery app that allows unauthorized access to protected content. Succe...

Oct 11, 2025
CVE-2025-48527
6.2

This vulnerability allows attackers to access hidden work profile notifications on Android devices without user interaction. It enables local informat...

Sep 4, 2025
CVE-2025-54615
6.2

This vulnerability in the media library module allows unauthorized access to protected information, potentially exposing sensitive data. It affects Hu...

Aug 6, 2025
CVE-2025-47980
6.2

This vulnerability in Windows Imaging Component allows local attackers to access sensitive information they shouldn't have access to. It affects Windo...

Jul 8, 2025
CVE-2025-31218
6.2

This vulnerability allows applications to observe hostnames of new network connections on macOS systems, potentially exposing sensitive information ab...

May 12, 2025
CVE-2024-54119
6.2

This CVE describes a cross-process screen stack vulnerability in Huawei's UIExtension module that could allow unauthorized access to screen content ac...

Dec 12, 2024
CVE-2024-36910
6.2

This vulnerability in the Linux kernel's uio_hv_generic driver could allow an untrusted hypervisor in Confidential Computing (CoCo) virtual machines t...

May 30, 2024
CVE-2025-8887
6.1

This CVE describes multiple vulnerabilities in Usta Information Systems Aybs Interaktif software that allow attackers to bypass authorization, access ...

Oct 10, 2025
CVE-2025-22227
6.1

The Reactor Netty HTTP client can leak credentials when configured to follow redirects in specific chained redirect scenarios. This affects applicatio...

Jul 16, 2025
CVE-2020-13481
6.1

This CVE describes a cross-site scripting (XSS) vulnerability in certain Lexmark printer products that allows attackers to inject malicious scripts. W...

Feb 19, 2025
CVE-2026-24916
5.9

This CVE describes an identity authentication bypass vulnerability in the window module that allows attackers to bypass authentication mechanisms. Suc...

Feb 6, 2026
CVE-2025-13439
5.9

The Fancy Product Designer WordPress plugin has a vulnerability that allows unauthenticated attackers to read sensitive files on the server, including...

Dec 16, 2025
CVE-2025-50862
5.9

The Lotus Cars Android app (version 1.2.8) has allowBackup=true in its manifest, enabling attackers with physical access to rooted or debug-enabled de...

Aug 14, 2025
CVE-2025-4222
5.9

The Database Toolset WordPress plugin stores database backup files in a publicly accessible directory, allowing unauthenticated attackers to potential...

May 3, 2025
CVE-2025-30218
5.9

This Next.js vulnerability allows the x-middleware-subrequest-id header to be unintentionally leaked to third-party servers during fetch requests from...

Apr 2, 2025
CVE-2024-13609
EPSS 45.6% 5.9

The 1 Click WordPress Migration Plugin exposes sensitive user data including usernames and password hashes during backup operations. Unauthenticated a...

Feb 18, 2025
CVE-2024-13641
5.9

This vulnerability allows unauthenticated attackers to access sensitive files stored in the '/wp-content/attachment' directory of the WooCommerce Retu...

Feb 14, 2025
CVE-2025-21242
5.9

This Windows Kerberos vulnerability allows attackers to disclose sensitive information from memory. It affects Windows systems using Kerberos authenti...

Jan 14, 2025
CVE-2024-45040
5.9

This vulnerability in gnark's Groth16 implementation breaks zero-knowledge property for proofs with commitments, allowing attackers to potentially ded...

Sep 6, 2024
CVE-2024-5813
5.9

An authenticated attacker with administrative privileges can exploit an information leak in BIPS to access SSH private keys from server responses. Thi...

Jun 11, 2024
CVE-2025-53047
5.8

This vulnerability allows unauthenticated attackers with network access via Bonjour to read sensitive data from Oracle Database Server's Portable Clus...

Oct 21, 2025
CVE-2025-61780
5.8

This vulnerability allows attackers to bypass proxy-level access restrictions in Rack applications using Rack::Sendfile with certain proxy configurati...

Oct 10, 2025
CVE-2025-46813
5.8

This CVE describes a data leak vulnerability in Discourse where unauthenticated users could view private content on the homepage of login-required sit...

May 5, 2025
CVE-2025-26485
5.8

This vulnerability in Beta80 Life 1st allows attackers to distinguish between invalid passwords and non-existent users through different error message...

Mar 19, 2025
CVE-2025-13821
5.7

This vulnerability allows authenticated Mattermost users to exfiltrate sensitive data including password hashes and MFA secrets through WebSocket mess...

Feb 16, 2026
CVE-2025-26711
5.7

This vulnerability allows unauthorized attackers to access sensitive information through ZTE T5400's web interface due to improper permission controls...

Sep 16, 2025
CVE-2025-26709
5.7

This vulnerability allows unauthorized attackers to access sensitive information through ZTE F50's web interface due to improper permission controls. ...

Aug 15, 2025
CVE-2024-58257
5.7

EnzoH contains an OS command injection vulnerability that allows attackers to execute arbitrary commands on affected systems. This affects organizatio...

Aug 8, 2025
CVE-2025-25209
5.7

This vulnerability in Red Hat Connectivity Link allows developers with access to leak secrets via HTTP connections. The AuthPolicy metadata incorrectl...

Jun 9, 2025
CVE-2025-20624
5.7

This vulnerability in Intel Tiber Edge Platform's Edge Orchestrator software allows authenticated users on adjacent networks to access sensitive infor...

May 13, 2025

About Information Exposure (CWE-200)

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

Our database tracks 1,066 CVEs classified as CWE-200, with 92 rated critical and 389 rated high severity. The average CVSS score for Information Exposure vulnerabilities is 6.5.

External reference: View CWE-200 on MITRE CWE →

Monitor Information Exposure Vulnerabilities

Get alerted when new Information Exposure CVEs affect your infrastructure.

Start Monitoring Free