CWE-269: Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.

760
Total CVEs
164
Critical
506
High
8.1
Avg CVSS
1
In CISA KEV

Yearly Trend

2026
49
2025
213
2024
225
2023
118
2022
49

Top Affected Vendors

1 Microsoft 56
2 Google 44
3 Huawei 25
4 Apple 20
5 Oracle 19
6 Trendmicro 13
7 Dell 10
8 Fortinet 8
9 Apache 7
10 Citrix 7

All Improper Privilege Management CVEs (760)

CVE-2025-20282
10.0

This critical vulnerability in Cisco ISE and ISE-PIC allows unauthenticated remote attackers to upload arbitrary files and execute them as root on the...

Jun 25, 2025
CVE-2025-0505
10.0

This vulnerability allows attackers to exploit Zero Touch Provisioning on Arista CloudVision systems to gain administrative privileges with excessive ...

May 8, 2025
CVE-2023-48418
10.0

This vulnerability allows local privilege escalation on affected Android devices by enabling adb (Android Debug Bridge) access before Setup Wizard com...

Jan 2, 2024
CVE-2023-48419
10.0

This vulnerability allows an attacker within Wi-Fi range of a Google Home device to spy on the victim and gain elevated privileges. It affects Google ...

Jan 2, 2024
CVE-2022-24783
10.0

This critical vulnerability in Deno runtime allows malicious code to bypass all permission checks and execute arbitrary shell commands with full syste...

Mar 25, 2022
CVE-2021-39168
10.0

This vulnerability in OpenZeppelin's TimelockController smart contract allows actors with the executor role to escalate privileges and potentially gai...

Aug 27, 2021
CVE-2021-1388
10.0

This vulnerability allows unauthenticated remote attackers to bypass authentication on Cisco ACI Multi-Site Orchestrator (MSO) by exploiting improper ...

Feb 24, 2021
CVE-2025-67781
9.9

This vulnerability allows local unprivileged users on Windows systems to manipulate privileged DriveLock processes, enabling privilege escalation. Att...

Dec 17, 2025
CVE-2025-55187
9.9

This vulnerability in DriveLock allows attackers to gain elevated privileges, potentially leading to full system compromise. It affects DriveLock vers...

Sep 26, 2025
CVE-2024-45496
9.9

This vulnerability in OpenShift Container Platform allows attackers with developer-level access to execute arbitrary commands on worker nodes by explo...

Sep 17, 2024
CVE-2024-33226
9.9

This vulnerability in Wistron Corporation's TBT Force Power Control driver allows attackers to escalate privileges and execute arbitrary code by sendi...

May 22, 2024
CVE-2024-24830
9.9

This vulnerability allows any authenticated regular user in OpenObserve to create new users with administrative 'root' privileges, bypassing intended ...

Feb 8, 2024
CVE-2023-20048
9.9

This vulnerability allows authenticated remote attackers to execute unauthorized configuration commands on Firepower Threat Defense devices managed by...

Nov 1, 2023
CVE-2023-34465
9.9

This vulnerability allows any logged-in user in XWiki Platform to modify mail configuration settings, including viewing and editing SMTP credentials. ...

Jun 23, 2023
CVE-2023-22651
9.9

A privilege escalation vulnerability in SUSE Rancher allows attackers to bypass admission webhook security checks and gain elevated privileges in Kube...

May 4, 2023
CVE-2021-36302
9.9

This vulnerability allows a remote attacker with standard JEA (Just Enough Administration) credentials to escalate privileges and potentially take ove...

Feb 9, 2022
CVE-2026-1492
9.8

This vulnerability allows unauthenticated attackers to create administrator accounts on WordPress sites using the User Registration & Membership plugi...

Mar 3, 2026
CVE-2026-2780
9.8

This CVE describes a privilege escalation vulnerability in Firefox's Netmonitor component. Attackers could exploit this to gain elevated privileges wi...

Feb 24, 2026
CVE-2026-2782
9.8

This CVE describes a privilege escalation vulnerability in Firefox's Netmonitor component that allows attackers to gain elevated privileges on affecte...

Feb 24, 2026
CVE-2026-26725
9.8

A privilege escalation vulnerability in edu Business Solutions Print Shop Pro WebDesk allows remote attackers to gain elevated privileges by manipulat...

Feb 20, 2026
CVE-2026-1994
9.8

The s2Member WordPress plugin has a critical vulnerability that allows unauthenticated attackers to change any user's password, including administrato...

Feb 19, 2026
CVE-2025-13851
9.8

The Buyent Classified plugin for WordPress allows unauthenticated attackers to register accounts with administrator privileges by manipulating the use...

Feb 19, 2026
CVE-2025-13563
9.8

This vulnerability allows unauthenticated attackers to register as administrators on WordPress sites using the Lizza LMS Pro plugin. All WordPress sit...

Feb 19, 2026
CVE-2025-12882
9.8

The Clasifico Listing WordPress plugin allows unauthenticated attackers to register accounts with administrator privileges by manipulating the 'listin...

Feb 19, 2026
CVE-2026-26369
9.8

CVE-2026-26369 is a privilege escalation vulnerability in eNet SMART HOME server where low-privileged users can elevate themselves to administrative p...

Feb 15, 2026
CVE-2025-8572
9.8

The Truelysell Core WordPress plugin allows unauthenticated attackers to create administrator accounts due to insufficient validation of the user_role...

Feb 14, 2026
CVE-2025-15027
9.8

The JAY Login & Register WordPress plugin allows unauthenticated attackers to update arbitrary user metadata through a vulnerable AJAX function, enabl...

Feb 8, 2026
CVE-2025-15030
9.8

The User Profile Builder WordPress plugin before version 3.15.2 has an improper password reset mechanism that allows unauthenticated attackers to rese...

Feb 2, 2026
CVE-2026-0920
9.8

The LA-Studio Element Kit for Elementor WordPress plugin allows unauthenticated attackers to create administrator accounts by manipulating the registr...

Jan 22, 2026
CVE-2025-15403
9.8

This vulnerability in the RegistrationMagic WordPress plugin allows unauthenticated attackers to manipulate menu generation logic, granting administra...

Jan 17, 2026
CVE-2026-22238
9.8

This critical vulnerability in BLUVOYIX allows unauthenticated attackers to create admin users via specially crafted HTTP requests to admin APIs. Succ...

Jan 14, 2026
CVE-2026-22043
9.8

A privilege escalation vulnerability in RustFS IAM allows restricted service accounts or STS credentials to self-issue unrestricted service accounts w...

Jan 8, 2026
CVE-2025-13619
9.8

The Flex Store Users WordPress plugin allows unauthenticated attackers to register accounts with administrator privileges due to improper role validat...

Dec 20, 2025
CVE-2025-67793
9.8

A privilege escalation vulnerability in DriveLock allows users with 'Manage roles and permissions' privilege to promote themselves or other users to S...

Dec 17, 2025
CVE-2025-13764
9.8

The WP CarDealer WordPress plugin has a critical privilege escalation vulnerability that allows unauthenticated attackers to register accounts with ad...

Dec 11, 2025
CVE-2025-13542
9.8

The DesignThemes LMS WordPress plugin allows unauthenticated attackers to register accounts with administrator privileges due to improper role validat...

Dec 2, 2025
CVE-2025-59693
9.8

This vulnerability allows a physically proximate attacker to bypass tamper protection on Entrust hardware security modules, gaining debug access and p...

Dec 2, 2025
CVE-2025-13540
9.8

The Tiare Membership WordPress plugin has a privilege escalation vulnerability that allows unauthenticated attackers to register accounts with adminis...

Nov 27, 2025
CVE-2025-13538
9.8

The FindAll Listing plugin for WordPress has a privilege escalation vulnerability that allows unauthenticated attackers to register as administrators ...

Nov 27, 2025
CVE-2025-13559
9.8

The EduKart Pro WordPress plugin allows unauthenticated attackers to register accounts with administrator privileges due to improper role validation. ...

Nov 25, 2025
CVE-2025-11457
9.8

This vulnerability allows unauthenticated attackers to register as administrators on WordPress sites using the EasyCommerce plugin. Attackers can gain...

Nov 11, 2025
CVE-2025-8900
9.8

The Doccure Core WordPress plugin allows unauthenticated attackers to create accounts with administrator privileges by manipulating the user_type fiel...

Nov 3, 2025
CVE-2025-8489
EPSS 39.1% 9.8

This vulnerability in the King Addons for Elementor WordPress plugin allows unauthenticated attackers to register administrator-level user accounts du...

Oct 31, 2025
CVE-2025-12424
9.8

This vulnerability allows local attackers to escalate privileges by exploiting a SUID-bit binary in BLU-IC2 and BLU-IC4 devices. Attackers can gain ro...

Oct 28, 2025
CVE-2025-7851
9.8

This vulnerability allows an attacker to gain root shell access on Omada gateway devices under restricted conditions. It affects TP-Link Omada busines...

Oct 21, 2025
CVE-2025-11533
9.8

The WP Freeio WordPress plugin allows unauthenticated attackers to register accounts with administrator privileges due to improper role validation. Th...

Oct 11, 2025
CVE-2025-57118
9.8

This vulnerability in PHPGurukul Online Library Management System v3.0 allows attackers to escalate privileges via index.php, potentially gaining admi...

Sep 15, 2025
CVE-2025-36904
9.8

This vulnerability in the WLAN subsystem of Android on Google Pixel devices allows local attackers to gain elevated privileges on affected devices. At...

Sep 4, 2025
CVE-2025-36890
9.8

CVE-2025-36890 is an elevation of privilege vulnerability in Android that allows attackers to gain higher system privileges than intended. This affect...

Sep 4, 2025
CVE-2025-36896
9.8

This vulnerability in the WLAN subsystem of Android on Google Pixel devices allows local attackers to gain elevated privileges on the device. It affec...

Sep 4, 2025

About Improper Privilege Management (CWE-269)

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.

Our database tracks 760 CVEs classified as CWE-269, with 164 rated critical and 506 rated high severity. The average CVSS score for Improper Privilege Management vulnerabilities is 8.1.

External reference: View CWE-269 on MITRE CWE →

Monitor Improper Privilege Management Vulnerabilities

Get alerted when new Improper Privilege Management CVEs affect your infrastructure.

Start Monitoring Free