CWE-269: Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.
Yearly Trend
Top Affected Vendors
All Improper Privilege Management CVEs (767)
This critical vulnerability in Cisco ISE and ISE-PIC allows unauthenticated remote attackers to upload arbitrary files and execute them as root on the...
Jun 25, 2025This vulnerability allows attackers to exploit Zero Touch Provisioning on Arista CloudVision systems to gain administrative privileges with excessive ...
May 8, 2025This vulnerability allows local privilege escalation on affected Android devices by enabling adb (Android Debug Bridge) access before Setup Wizard com...
Jan 2, 2024This vulnerability allows an attacker within Wi-Fi range of a Google Home device to spy on the victim and gain elevated privileges. It affects Google ...
Jan 2, 2024This critical vulnerability in Deno runtime allows malicious code to bypass all permission checks and execute arbitrary shell commands with full syste...
Mar 25, 2022This vulnerability in OpenZeppelin's TimelockController smart contract allows actors with the executor role to escalate privileges and potentially gai...
Aug 27, 2021This vulnerability allows unauthenticated remote attackers to bypass authentication on Cisco ACI Multi-Site Orchestrator (MSO) by exploiting improper ...
Feb 24, 2021This vulnerability allows local unprivileged users on Windows systems to manipulate privileged DriveLock processes, enabling privilege escalation. Att...
Dec 17, 2025This vulnerability in DriveLock allows attackers to gain elevated privileges, potentially leading to full system compromise. It affects DriveLock vers...
Sep 26, 2025This vulnerability in OpenShift Container Platform allows attackers with developer-level access to execute arbitrary commands on worker nodes by explo...
Sep 17, 2024This vulnerability in Wistron Corporation's TBT Force Power Control driver allows attackers to escalate privileges and execute arbitrary code by sendi...
May 22, 2024This vulnerability allows any authenticated regular user in OpenObserve to create new users with administrative 'root' privileges, bypassing intended ...
Feb 8, 2024This vulnerability allows authenticated remote attackers to execute unauthorized configuration commands on Firepower Threat Defense devices managed by...
Nov 1, 2023This vulnerability allows any logged-in user in XWiki Platform to modify mail configuration settings, including viewing and editing SMTP credentials. ...
Jun 23, 2023A privilege escalation vulnerability in SUSE Rancher allows attackers to bypass admission webhook security checks and gain elevated privileges in Kube...
May 4, 2023This vulnerability allows a remote attacker with standard JEA (Just Enough Administration) credentials to escalate privileges and potentially take ove...
Feb 9, 2022This vulnerability allows unauthenticated attackers to create administrator accounts on WordPress sites using the User Registration & Membership plugi...
Mar 3, 2026This CVE describes a privilege escalation vulnerability in Firefox's Netmonitor component. Attackers could exploit this to gain elevated privileges wi...
Feb 24, 2026This CVE describes a privilege escalation vulnerability in Firefox's Netmonitor component that allows attackers to gain elevated privileges on affecte...
Feb 24, 2026A privilege escalation vulnerability in edu Business Solutions Print Shop Pro WebDesk allows remote attackers to gain elevated privileges by manipulat...
Feb 20, 2026The s2Member WordPress plugin has a critical vulnerability that allows unauthenticated attackers to change any user's password, including administrato...
Feb 19, 2026The Buyent Classified plugin for WordPress allows unauthenticated attackers to register accounts with administrator privileges by manipulating the use...
Feb 19, 2026This vulnerability allows unauthenticated attackers to register as administrators on WordPress sites using the Lizza LMS Pro plugin. All WordPress sit...
Feb 19, 2026The Clasifico Listing WordPress plugin allows unauthenticated attackers to register accounts with administrator privileges by manipulating the 'listin...
Feb 19, 2026CVE-2026-26369 is a privilege escalation vulnerability in eNet SMART HOME server where low-privileged users can elevate themselves to administrative p...
Feb 15, 2026The Truelysell Core WordPress plugin allows unauthenticated attackers to create administrator accounts due to insufficient validation of the user_role...
Feb 14, 2026The JAY Login & Register WordPress plugin allows unauthenticated attackers to update arbitrary user metadata through a vulnerable AJAX function, enabl...
Feb 8, 2026The User Profile Builder WordPress plugin before version 3.15.2 has an improper password reset mechanism that allows unauthenticated attackers to rese...
Feb 2, 2026The LA-Studio Element Kit for Elementor WordPress plugin allows unauthenticated attackers to create administrator accounts by manipulating the registr...
Jan 22, 2026This vulnerability in the RegistrationMagic WordPress plugin allows unauthenticated attackers to manipulate menu generation logic, granting administra...
Jan 17, 2026This critical vulnerability in BLUVOYIX allows unauthenticated attackers to create admin users via specially crafted HTTP requests to admin APIs. Succ...
Jan 14, 2026A privilege escalation vulnerability in RustFS IAM allows restricted service accounts or STS credentials to self-issue unrestricted service accounts w...
Jan 8, 2026The Flex Store Users WordPress plugin allows unauthenticated attackers to register accounts with administrator privileges due to improper role validat...
Dec 20, 2025A privilege escalation vulnerability in DriveLock allows users with 'Manage roles and permissions' privilege to promote themselves or other users to S...
Dec 17, 2025The WP CarDealer WordPress plugin has a critical privilege escalation vulnerability that allows unauthenticated attackers to register accounts with ad...
Dec 11, 2025The DesignThemes LMS WordPress plugin allows unauthenticated attackers to register accounts with administrator privileges due to improper role validat...
Dec 2, 2025This vulnerability allows a physically proximate attacker to bypass tamper protection on Entrust hardware security modules, gaining debug access and p...
Dec 2, 2025The Tiare Membership WordPress plugin has a privilege escalation vulnerability that allows unauthenticated attackers to register accounts with adminis...
Nov 27, 2025The FindAll Listing plugin for WordPress has a privilege escalation vulnerability that allows unauthenticated attackers to register as administrators ...
Nov 27, 2025The EduKart Pro WordPress plugin allows unauthenticated attackers to register accounts with administrator privileges due to improper role validation. ...
Nov 25, 2025This vulnerability allows unauthenticated attackers to register as administrators on WordPress sites using the EasyCommerce plugin. Attackers can gain...
Nov 11, 2025The Doccure Core WordPress plugin allows unauthenticated attackers to create accounts with administrator privileges by manipulating the user_type fiel...
Nov 3, 2025This vulnerability in the King Addons for Elementor WordPress plugin allows unauthenticated attackers to register administrator-level user accounts du...
Oct 31, 2025This vulnerability allows local attackers to escalate privileges by exploiting a SUID-bit binary in BLU-IC2 and BLU-IC4 devices. Attackers can gain ro...
Oct 28, 2025This vulnerability allows an attacker to gain root shell access on Omada gateway devices under restricted conditions. It affects TP-Link Omada busines...
Oct 21, 2025The WP Freeio WordPress plugin allows unauthenticated attackers to register accounts with administrator privileges due to improper role validation. Th...
Oct 11, 2025This vulnerability in PHPGurukul Online Library Management System v3.0 allows attackers to escalate privileges via index.php, potentially gaining admi...
Sep 15, 2025This vulnerability in the WLAN subsystem of Android on Google Pixel devices allows local attackers to gain elevated privileges on affected devices. At...
Sep 4, 2025CVE-2025-36890 is an elevation of privilege vulnerability in Android that allows attackers to gain higher system privileges than intended. This affect...
Sep 4, 2025This vulnerability in the WLAN subsystem of Android on Google Pixel devices allows local attackers to gain elevated privileges on the device. It affec...
Sep 4, 2025About Improper Privilege Management (CWE-269)
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.
Our database tracks 767 CVEs classified as CWE-269, with 165 rated critical and 512 rated high severity. The average CVSS score for Improper Privilege Management vulnerabilities is 8.1.
External reference: View CWE-269 on MITRE CWE →
Monitor Improper Privilege Management Vulnerabilities
Get alerted when new Improper Privilege Management CVEs affect your infrastructure.
Start Monitoring Free