CWE-266: CWE-266

417
Total CVEs
48
Critical
131
High
6.7
Avg CVSS

Yearly Trend

2026
74
2025
267
2024
59
2023
5
2022
4

Top Affected Vendors

1 Jeecg 11
2 Portabilis 11
3 Dell 10
4 Google 9
5 Fuyang Lipengjun 8
6 Macrozheng 8
7 Dlink 8
8 Totolink 7
9 Wekan Project 7
10 Youlai 6

All CWE-266 CVEs (417)

CVE-2025-11048
6.3

This vulnerability allows attackers to bypass authorization controls in Portabilis i-Educar's /consulta-dispensas endpoint, potentially accessing unau...

Sep 26, 2025
CVE-2025-11047
6.3

This vulnerability in Portabilis i-Educar allows attackers to bypass authorization controls and enumerate student records by manipulating the aluno_id...

Sep 26, 2025
CVE-2025-10988
6.3

This vulnerability allows unauthorized access to the business transfer functionality in YunaiV ruoyi-vue-pro CRM systems. Attackers can remotely explo...

Sep 26, 2025
CVE-2025-10989
6.3

This vulnerability in yangzongzhuan RuoYi up to version 4.8.1 allows attackers to bypass authorization controls by manipulating the userIds parameter ...

Sep 26, 2025
CVE-2025-10987
6.3

This vulnerability allows remote attackers to bypass authorization controls in YunaiV yudao-cloud by manipulating the contactId parameter in the /crm/...

Sep 26, 2025
CVE-2025-10608
6.3

This vulnerability in Portabilis i-Educar allows attackers to bypass access controls on the /enrollment-history/ endpoint, potentially accessing unaut...

Sep 17, 2025
CVE-2025-10291
6.3

This vulnerability in linlinjava litemall up to version 1.8.0 allows remote attackers to bypass authorization controls via manipulation of the ID para...

Sep 12, 2025
CVE-2025-10278
6.3

This vulnerability allows unauthorized contact transfer in YunaiV ruoyi-vue-pro CRM systems. Attackers can remotely manipulate contact ownership witho...

Sep 12, 2025
CVE-2025-10276
6.3

This vulnerability allows unauthorized users to transfer CRM contracts to different owners due to improper authorization checks in the YunaiV ruoyi-vu...

Sep 12, 2025
CVE-2025-10277
6.3

This vulnerability in YunaiV yudao-cloud allows remote attackers to bypass authorization controls by manipulating the ID parameter in the /crm/receiva...

Sep 12, 2025
CVE-2025-10275
6.3

This vulnerability in YunaiV yudao-cloud allows attackers to bypass authorization controls by manipulating parameters in the /crm/business/transfer en...

Sep 12, 2025
CVE-2025-10247
6.3

This vulnerability allows attackers to bypass access controls in JEPaaS 7.2.8 by exploiting the doFilterInternal function in the Filter Handler compon...

Sep 11, 2025
CVE-2025-10086
6.3

CVE-2025-10086 is an improper authorization vulnerability in the fuyang_lipengjun platform 1.0.0 that allows remote attackers to access unauthorized f...

Sep 8, 2025
CVE-2025-10071
6.3

This vulnerability allows attackers to bypass access controls in Portabilis i-Educar's batch enrollment cancellation endpoint. Remote attackers can ma...

Sep 7, 2025
CVE-2025-10072
6.3

This vulnerability in Portabilis i-Educar allows attackers to bypass access controls on the student enrollment endpoint, potentially manipulating stud...

Sep 7, 2025
CVE-2025-10070
6.3

CVE-2025-10070 is an improper access control vulnerability in Portabilis i-Educar up to version 2.10 that allows remote attackers to bypass authorizat...

Sep 7, 2025
CVE-2025-8797
6.3

A critical permission vulnerability in LitmusChaos Litmus up to version 3.19.0 allows remote attackers to exploit the LocalStorage Handler component. ...

Aug 10, 2025
CVE-2025-8795
6.3

This critical vulnerability in LitmusChaos Litmus allows attackers to bypass access controls via improper validation of the projectID parameter in the...

Aug 10, 2025
CVE-2025-8791
6.3

This critical vulnerability in LitmusChaos Litmus allows attackers to bypass authorization controls by manipulating the 'role' parameter in the /auth/...

Aug 10, 2025
CVE-2025-8756
6.3

This vulnerability allows attackers to bypass authorization checks in TDuckCloud tduck-platform's management interface, potentially accessing administ...

Aug 9, 2025
CVE-2025-7552
6.3

This critical vulnerability in Dromara Northstar allows attackers to bypass authorization controls by manipulating request arguments in the preHandle ...

Jul 14, 2025
CVE-2025-6736
6.3

This critical vulnerability in juzaweb CMS 3.4.2 allows unprivileged users to upload new themes via the /admin-cp/theme/install endpoint due to improp...

Jun 27, 2025
CVE-2025-5428
6.3

This critical vulnerability in juzaweb CMS allows unprivileged users to access and potentially delete error logs through the /admin-cp/log-viewer endp...

Jun 2, 2025
CVE-2025-5425
6.3

CVE-2025-5425 is a critical improper access control vulnerability in juzaweb CMS that allows unprivileged users to access the theme editor page remote...

Jun 2, 2025
CVE-2025-5423
6.3

This vulnerability allows unprivileged users to modify general system settings in juzaweb CMS due to improper access controls on the General Setting P...

Jun 2, 2025
CVE-2025-5421
6.3

This critical vulnerability in juzaweb CMS allows unprivileged users to access the plugin editor page, bypassing proper access controls. Attackers can...

Jun 2, 2025
CVE-2025-5390
6.3

This critical vulnerability in JeeWMS allows remote attackers to bypass access controls on the file handling component, potentially accessing or manip...

May 31, 2025
CVE-2025-4036
6.3

This CVE describes an authorization bypass vulnerability in Novel 3.5.0 that allows attackers to remotely manipulate book chapters without proper auth...

Apr 28, 2025
CVE-2025-3587
6.3

This critical vulnerability in ZeroWdd/code-projects studentmanager 1.0 allows unauthorized access to the /getTeacherList endpoint due to improper aut...

Apr 14, 2025
CVE-2025-3569
6.3

This critical vulnerability in JamesZBL/code-projects db-hospital-drug 1.0 allows remote attackers to bypass authorization controls due to improper co...

Apr 14, 2025
CVE-2025-3256
6.3

This vulnerability in admintwo 1.0 allows attackers to bypass access controls via the email parameter in the /user/updateSet endpoint, potentially ena...

Apr 4, 2025
CVE-2025-2121
6.3

A critical vulnerability in Thinkware Car Dashcam F800 Pro allows improper access controls in the File Storage component. Attackers on the same local ...

Mar 9, 2025
CVE-2025-1847
6.3

This CVE describes an improper authorization vulnerability in zj1983 zz software up to version 2024-8. Attackers can exploit this remotely to bypass a...

Mar 3, 2025
CVE-2025-0783
6.3

This vulnerability allows unauthorized access to API endpoints in pankajindevops scale up software due to improper access controls. Attackers can remo...

Jan 28, 2025
CVE-2024-11485
6.3

This critical vulnerability in Code4Berry Decoration Management System 1.0 allows attackers to bypass permission controls through the /decoration/admi...

Nov 20, 2024
CVE-2024-10764
6.3

This critical vulnerability in Codezips Online Institute Management System 1.0 allows remote attackers to upload arbitrary files via the /pages/save_u...

Nov 4, 2024
CVE-2024-9082
6.3

This vulnerability in SourceCodester Online Eyewear Shop 1.0 allows attackers to bypass authorization controls during user creation. By manipulating t...

Sep 22, 2024
CVE-2024-0085
6.3

This vulnerability in NVIDIA vGPU software allows unprivileged users on Windows or Linux systems to execute privileged operations on the host, potenti...

Jun 13, 2024
CVE-2021-47799
6.2

Visual Tools DVR VX16 version 4.2.28 contains a local privilege escalation vulnerability in its Sudo configuration. Attackers with local access can ex...

Jan 15, 2026
CVE-2022-50927
6.2

CVE-2022-50927 is a local privilege escalation vulnerability in Cyclades Serial Console Server version 3.3.0. Attackers with local access can exploit ...

Jan 13, 2026
CVE-2024-42441
6.2

A privilege escalation vulnerability in Zoom's macOS installers allows local privileged users to gain higher system privileges. This affects Zoom Work...

Aug 14, 2024
CVE-2026-1411
6.1

This vulnerability in Beetel 777VR1 routers allows attackers with physical access to bypass access controls via the UART interface, potentially gainin...

Jan 26, 2026
CVE-2025-5417
6.1

An insufficient access control vulnerability in Red Hat Developer Hub allows cluster admins/users with standard access to modify the rhdh/rhdh-hub-rhe...

Aug 19, 2025
CVE-2025-14660
5.6

This vulnerability in DecoCMS Mesh allows improper access control through manipulation of the domain argument in the createTool function. Attackers ca...

Dec 14, 2025
CVE-2025-58841
5.5

This vulnerability allows authenticated users with lower privileges to escalate their permissions within the Media Author WordPress plugin. It affects...

Sep 5, 2025
CVE-2026-2849
5.4

This vulnerability in yeqifu warehouse allows improper access controls in cache management functions, potentially enabling unauthorized cache manipula...

Feb 20, 2026
CVE-2025-14778
5.4

This Keycloak vulnerability allows a user who owns one resource to modify authorization policies for other resources they don't own when those resourc...

Feb 9, 2026
CVE-2026-2109
5.4

This vulnerability allows unauthorized deletion of categories in jsbroks COCO Annotator through improper authorization in the Delete Category Handler....

Feb 7, 2026
CVE-2026-1112
5.4

This CVE describes an improper authorization vulnerability in Sanluan PublicCMS's trade address deletion endpoint. Attackers can remotely manipulate t...

Jan 18, 2026
CVE-2026-1106
5.4

This vulnerability in Chamilo LMS allows attackers to manipulate the userId parameter in the deleteLegal function, leading to improper authorization. ...

Jan 18, 2026

About CWE-266 (CWE-266)

Our database tracks 417 CVEs classified as CWE-266, with 48 rated critical and 131 rated high severity. The average CVSS score for CWE-266 vulnerabilities is 6.7.

External reference: View CWE-266 on MITRE CWE →

Monitor CWE-266 Vulnerabilities

Get alerted when new CWE-266 CVEs affect your infrastructure.

Start Monitoring Free