CWE-266: CWE-266
Yearly Trend
Top Affected Vendors
All CWE-266 CVEs (417)
This vulnerability allows attackers to bypass authorization controls in Portabilis i-Educar's /consulta-dispensas endpoint, potentially accessing unau...
Sep 26, 2025This vulnerability in Portabilis i-Educar allows attackers to bypass authorization controls and enumerate student records by manipulating the aluno_id...
Sep 26, 2025This vulnerability allows unauthorized access to the business transfer functionality in YunaiV ruoyi-vue-pro CRM systems. Attackers can remotely explo...
Sep 26, 2025This vulnerability in yangzongzhuan RuoYi up to version 4.8.1 allows attackers to bypass authorization controls by manipulating the userIds parameter ...
Sep 26, 2025This vulnerability allows remote attackers to bypass authorization controls in YunaiV yudao-cloud by manipulating the contactId parameter in the /crm/...
Sep 26, 2025This vulnerability in Portabilis i-Educar allows attackers to bypass access controls on the /enrollment-history/ endpoint, potentially accessing unaut...
Sep 17, 2025This vulnerability in linlinjava litemall up to version 1.8.0 allows remote attackers to bypass authorization controls via manipulation of the ID para...
Sep 12, 2025This vulnerability allows unauthorized contact transfer in YunaiV ruoyi-vue-pro CRM systems. Attackers can remotely manipulate contact ownership witho...
Sep 12, 2025This vulnerability allows unauthorized users to transfer CRM contracts to different owners due to improper authorization checks in the YunaiV ruoyi-vu...
Sep 12, 2025This vulnerability in YunaiV yudao-cloud allows remote attackers to bypass authorization controls by manipulating the ID parameter in the /crm/receiva...
Sep 12, 2025This vulnerability in YunaiV yudao-cloud allows attackers to bypass authorization controls by manipulating parameters in the /crm/business/transfer en...
Sep 12, 2025This vulnerability allows attackers to bypass access controls in JEPaaS 7.2.8 by exploiting the doFilterInternal function in the Filter Handler compon...
Sep 11, 2025CVE-2025-10086 is an improper authorization vulnerability in the fuyang_lipengjun platform 1.0.0 that allows remote attackers to access unauthorized f...
Sep 8, 2025This vulnerability allows attackers to bypass access controls in Portabilis i-Educar's batch enrollment cancellation endpoint. Remote attackers can ma...
Sep 7, 2025This vulnerability in Portabilis i-Educar allows attackers to bypass access controls on the student enrollment endpoint, potentially manipulating stud...
Sep 7, 2025CVE-2025-10070 is an improper access control vulnerability in Portabilis i-Educar up to version 2.10 that allows remote attackers to bypass authorizat...
Sep 7, 2025A critical permission vulnerability in LitmusChaos Litmus up to version 3.19.0 allows remote attackers to exploit the LocalStorage Handler component. ...
Aug 10, 2025This critical vulnerability in LitmusChaos Litmus allows attackers to bypass access controls via improper validation of the projectID parameter in the...
Aug 10, 2025This critical vulnerability in LitmusChaos Litmus allows attackers to bypass authorization controls by manipulating the 'role' parameter in the /auth/...
Aug 10, 2025This vulnerability allows attackers to bypass authorization checks in TDuckCloud tduck-platform's management interface, potentially accessing administ...
Aug 9, 2025This critical vulnerability in Dromara Northstar allows attackers to bypass authorization controls by manipulating request arguments in the preHandle ...
Jul 14, 2025This critical vulnerability in juzaweb CMS 3.4.2 allows unprivileged users to upload new themes via the /admin-cp/theme/install endpoint due to improp...
Jun 27, 2025This critical vulnerability in juzaweb CMS allows unprivileged users to access and potentially delete error logs through the /admin-cp/log-viewer endp...
Jun 2, 2025CVE-2025-5425 is a critical improper access control vulnerability in juzaweb CMS that allows unprivileged users to access the theme editor page remote...
Jun 2, 2025This vulnerability allows unprivileged users to modify general system settings in juzaweb CMS due to improper access controls on the General Setting P...
Jun 2, 2025This critical vulnerability in juzaweb CMS allows unprivileged users to access the plugin editor page, bypassing proper access controls. Attackers can...
Jun 2, 2025This critical vulnerability in JeeWMS allows remote attackers to bypass access controls on the file handling component, potentially accessing or manip...
May 31, 2025This CVE describes an authorization bypass vulnerability in Novel 3.5.0 that allows attackers to remotely manipulate book chapters without proper auth...
Apr 28, 2025This critical vulnerability in ZeroWdd/code-projects studentmanager 1.0 allows unauthorized access to the /getTeacherList endpoint due to improper aut...
Apr 14, 2025This critical vulnerability in JamesZBL/code-projects db-hospital-drug 1.0 allows remote attackers to bypass authorization controls due to improper co...
Apr 14, 2025This vulnerability in admintwo 1.0 allows attackers to bypass access controls via the email parameter in the /user/updateSet endpoint, potentially ena...
Apr 4, 2025A critical vulnerability in Thinkware Car Dashcam F800 Pro allows improper access controls in the File Storage component. Attackers on the same local ...
Mar 9, 2025This CVE describes an improper authorization vulnerability in zj1983 zz software up to version 2024-8. Attackers can exploit this remotely to bypass a...
Mar 3, 2025This vulnerability allows unauthorized access to API endpoints in pankajindevops scale up software due to improper access controls. Attackers can remo...
Jan 28, 2025This critical vulnerability in Code4Berry Decoration Management System 1.0 allows attackers to bypass permission controls through the /decoration/admi...
Nov 20, 2024This critical vulnerability in Codezips Online Institute Management System 1.0 allows remote attackers to upload arbitrary files via the /pages/save_u...
Nov 4, 2024This vulnerability in SourceCodester Online Eyewear Shop 1.0 allows attackers to bypass authorization controls during user creation. By manipulating t...
Sep 22, 2024This vulnerability in NVIDIA vGPU software allows unprivileged users on Windows or Linux systems to execute privileged operations on the host, potenti...
Jun 13, 2024Visual Tools DVR VX16 version 4.2.28 contains a local privilege escalation vulnerability in its Sudo configuration. Attackers with local access can ex...
Jan 15, 2026CVE-2022-50927 is a local privilege escalation vulnerability in Cyclades Serial Console Server version 3.3.0. Attackers with local access can exploit ...
Jan 13, 2026A privilege escalation vulnerability in Zoom's macOS installers allows local privileged users to gain higher system privileges. This affects Zoom Work...
Aug 14, 2024This vulnerability in Beetel 777VR1 routers allows attackers with physical access to bypass access controls via the UART interface, potentially gainin...
Jan 26, 2026An insufficient access control vulnerability in Red Hat Developer Hub allows cluster admins/users with standard access to modify the rhdh/rhdh-hub-rhe...
Aug 19, 2025This vulnerability in DecoCMS Mesh allows improper access control through manipulation of the domain argument in the createTool function. Attackers ca...
Dec 14, 2025This vulnerability allows authenticated users with lower privileges to escalate their permissions within the Media Author WordPress plugin. It affects...
Sep 5, 2025This vulnerability in yeqifu warehouse allows improper access controls in cache management functions, potentially enabling unauthorized cache manipula...
Feb 20, 2026This Keycloak vulnerability allows a user who owns one resource to modify authorization policies for other resources they don't own when those resourc...
Feb 9, 2026This vulnerability allows unauthorized deletion of categories in jsbroks COCO Annotator through improper authorization in the Delete Category Handler....
Feb 7, 2026This CVE describes an improper authorization vulnerability in Sanluan PublicCMS's trade address deletion endpoint. Attackers can remotely manipulate t...
Jan 18, 2026This vulnerability in Chamilo LMS allows attackers to manipulate the userId parameter in the deleteLegal function, leading to improper authorization. ...
Jan 18, 2026About CWE-266 (CWE-266)
Our database tracks 417 CVEs classified as CWE-266, with 48 rated critical and 131 rated high severity. The average CVSS score for CWE-266 vulnerabilities is 6.7.
External reference: View CWE-266 on MITRE CWE →
Monitor CWE-266 Vulnerabilities
Get alerted when new CWE-266 CVEs affect your infrastructure.
Start Monitoring Free