CWE-269: Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.

816
Total CVEs
170
Critical
556
High
8.1
Avg CVSS
1
In CISA KEV

Yearly Trend

2026
50
2025
213
2024
225
2023
118
2022
49

Top Affected Vendors

1 Microsoft 81
2 Google 46
3 Huawei 26
4 Apple 20
5 Oracle 19
6 Trendmicro 13
7 Dell 11
8 Cisco 9
9 Fortinet 8
10 Apache 7

All Improper Privilege Management CVEs (816)

CVE-2025-29033
7.3

This vulnerability in BambooHR Build allows remote attackers to perform privilege escalation through an open redirect in the SAML authentication endpo...

Apr 1, 2025
CVE-2024-58104
7.3

This vulnerability in Trend Micro Apex One Security Agent allows a local attacker with low-privileged access to bypass security controls and execute a...

Mar 25, 2025
CVE-2024-21966
7.3

A DLL hijacking vulnerability in AMD Ryzen Master Utility allows attackers to place malicious DLLs in directories where the application searches for t...

Feb 11, 2025
CVE-2025-23208
7.3

CVE-2025-23208 is an authorization bypass vulnerability in Zot OCI image registry where group membership changes from identity providers are not prope...

Jan 17, 2025
CVE-2024-46999
7.3

This vulnerability in Zitadel identity management platform allows deactivated user grants to remain active in tokens, potentially granting unauthorize...

Sep 20, 2024
CVE-2024-2003
7.3

This CVE describes a local privilege escalation vulnerability in ESET security products where an attacker can misuse file operations during quarantine...

Jun 21, 2024
CVE-2023-46810
7.3

This CVE describes a local privilege escalation vulnerability in Ivanti Secure Access Client for Linux that allows authenticated low-privileged users ...

May 31, 2024
CVE-2024-0819
7.3

This vulnerability allows low-privileged users on systems running vulnerable TeamViewer Remote Client versions to elevate privileges by changing perso...

Feb 27, 2024
CVE-2023-6099
7.3

This critical vulnerability in Shenzhen Youkate Industrial Facial Love Cloud Payment System allows remote attackers to bypass privilege management by ...

Nov 13, 2023
CVE-2022-26668
7.3

ASUS Control Center API has broken access control allowing unauthenticated remote attackers to call privileged API functions. This can lead to partial...

Jun 20, 2022
CVE-2017-20025
7.3

This critical vulnerability in Solar-Log energy monitoring systems allows remote attackers to escalate privileges by manipulating flash memory functio...

Jun 9, 2022
CVE-2016-15002
7.3

This critical vulnerability in MONyog Ultimate 6.63 allows remote attackers to escalate privileges by manipulating cookie parameters (HasServerEdit/Is...

Jun 9, 2022
CVE-2022-20739
7.3

This vulnerability allows authenticated low-privileged users on Cisco SD-WAN vManage systems to escalate privileges to root by injecting commands into...

Apr 15, 2022
CVE-2022-0556
7.3

This CVE describes a local privilege escalation vulnerability in Zyxel AP Configurator (ZAC) version 1.1.4, where incorrect directory permissions allo...

Apr 11, 2022
CVE-2022-25311
7.3

CVE-2022-25311 is a privilege escalation vulnerability in Siemens SINEC NMS and SINEMA Server where authenticated low-privileged users can gain higher...

Mar 8, 2022
CVE-2021-36945
7.3

This vulnerability allows a local authenticated attacker to execute arbitrary code with SYSTEM privileges on affected Windows systems. It affects Wind...

Aug 12, 2021
CVE-2021-1704
7.3

CVE-2021-1704 is a privilege escalation vulnerability in Windows Hyper-V that allows an authenticated attacker to execute arbitrary code with SYSTEM p...

Jan 12, 2021
CVE-2021-1706
7.3

CVE-2021-1706 is a local privilege escalation vulnerability in Windows LUAFV (Local User Authority File Virtualization) driver that allows authenticat...

Jan 12, 2021
CVE-2021-1685
7.3

CVE-2021-1685 is an elevation of privilege vulnerability in Windows AppX Deployment Extensions that allows authenticated attackers to execute code wit...

Jan 12, 2021
CVE-2025-63909
7.2

This vulnerability allows attackers to escalate privileges to root and read/write arbitrary files on Cohesity TranZman Migration Appliance systems due...

Mar 3, 2026
CVE-2026-23896
7.2

This vulnerability allows low-privilege API keys in Immich to escalate their own permissions by calling the update endpoint, granting themselves full ...

Jan 29, 2026
CVE-2025-59697
7.2

This vulnerability allows a physically proximate attacker to edit the Legacy GRUB bootloader configuration on affected Entrust nShield HSM devices, en...

Dec 2, 2025
CVE-2024-13997
7.2

This vulnerability allows authenticated Nagios XI administrators to escalate their privileges to root on the underlying host system by abusing the Mig...

Nov 3, 2025
CVE-2025-36729
7.2

A privilege escalation vulnerability allows non-primary administrators with web interface access but no shell permissions to view the master admin pas...

Aug 26, 2025
CVE-2024-41199
7.2

This vulnerability in Ocuco Innovation's JOBMANAGER.EXE allows attackers to bypass authentication and gain Administrator privileges by sending a speci...

May 22, 2025
CVE-2025-44040
7.2

A privilege escalation vulnerability in OrangeHRM v5.7 allows attackers to bypass authentication via PHP loose-equality comparisons if a specific MD5 ...

May 21, 2025
CVE-2024-13835
7.2

The Post Meta Data Manager WordPress plugin allows authenticated attackers with Administrator access to escalate privileges on multisite installations...

Mar 8, 2025
CVE-2024-38775
7.2

This vulnerability in the CTX Feed WordPress plugin allows attackers to update arbitrary WordPress options due to improper privilege management. It en...

Aug 1, 2024
CVE-2024-3325
7.2

CVE-2024-3325 is an improper privilege management vulnerability (CWE-269) in Jaspersoft JasperReport Servers that allows authenticated users to escala...

Jul 10, 2024
CVE-2024-34370
7.2

This vulnerability in the WPFactory EAN for WooCommerce WordPress plugin allows attackers to update arbitrary WordPress options, leading to privilege ...

May 17, 2024
CVE-2024-33569
7.2

This vulnerability in the WordPress Instant Images plugin allows attackers to update arbitrary WordPress options, potentially leading to privilege esc...

May 17, 2024
CVE-2023-51546
7.2

This vulnerability allows attackers to escalate privileges in the WebToffee WooCommerce PDF plugin, potentially gaining administrative access to WordP...

May 17, 2024
CVE-2023-47682
7.2

This vulnerability allows authenticated WordPress users to escalate their privileges to administrator level through the WP User Frontend plugin. It af...

May 17, 2024
CVE-2024-22264
7.2

This vulnerability allows attackers with administrative access to VMware Avi Load Balancer to escalate privileges to root on the host system, enabling...

May 8, 2024
CVE-2023-25535
7.2

This vulnerability in Dell SupportAssist for Home PCs allows local attackers to escalate privileges during first-time installations. Only users who pe...

Feb 14, 2024
CVE-2023-5408
7.2

CVE-2023-5408 is a privilege escalation vulnerability in OpenShift's Kubernetes API server node restriction admission plugin. A remote attacker who ca...

Nov 2, 2023
CVE-2023-37859
7.2

This vulnerability allows remote attackers with knowledge of the SNMPv2 read/write community string to execute arbitrary system commands with root pri...

Aug 9, 2023
CVE-2022-48365
7.2

The Company admin role in eZ Platform Ibexa Kernel before version 1.3.26 grants excessive privileges, allowing users with this role to perform unautho...

Mar 12, 2023
CVE-2022-43759
7.2

This vulnerability in SUSE Rancher allows authenticated users with 'escalate' permissions on PRTBs (Project Role Template Bindings) to escalate their ...

Feb 7, 2023
CVE-2021-36784
7.2

This vulnerability allows users with the restricted-admin role in SUSE Rancher to escalate their privileges to full administrator access. It affects S...

May 2, 2022
CVE-2021-43835
7.2

CVE-2021-43835 is a privilege escalation vulnerability in Sulu CMS where authenticated users with any admin UI access can exploit the ProfileControlle...

Dec 15, 2021
CVE-2021-29792
7.2

This vulnerability in IBM Event Streams allows a user with access to the CA private key to create their own certificates, deploy them in the cluster, ...

Jul 12, 2021
CVE-2026-28548
7.1

This CVE describes an improper verification vulnerability in Huawei email applications that could allow attackers to access sensitive information. The...

Mar 5, 2026
CVE-2026-21223
7.1

This vulnerability allows a standard local user without administrative privileges to execute privileged update commands via Microsoft Edge's Elevation...

Jan 16, 2026
CVE-2025-68697
7.1

In self-hosted n8n instances prior to version 2.0.0, authenticated users with workflow editing access can exploit the Code node's legacy JavaScript ex...

Dec 26, 2025
CVE-2024-48729
7.1

This vulnerability in ETSI Open-Source MANO (OSM) allows remote authenticated attackers to escalate privileges through the /osm/admin/v1/users API end...

Jul 25, 2025
CVE-2025-4085
7.1

This vulnerability allows an attacker with control over a content process to abuse the privileged UITour actor, potentially leading to information dis...

Apr 29, 2025
CVE-2024-2297
7.1

The Bricks WordPress theme has a privilege escalation vulnerability that allows authenticated attackers with contributor-level access to execute arbit...

Feb 27, 2025
CVE-2025-0651
7.1

A privilege escalation vulnerability in Cloudflare WARP for Windows allows low-privileged users to create symbolic links that cause the WARP service (...

Jan 22, 2025
CVE-2024-22069
7.1

This vulnerability allows authenticated users with common permissions to intercept password change requests and modify administrator credentials on ZT...

Aug 8, 2024

About Improper Privilege Management (CWE-269)

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.

Our database tracks 816 CVEs classified as CWE-269, with 170 rated critical and 556 rated high severity. The average CVSS score for Improper Privilege Management vulnerabilities is 8.1.

External reference: View CWE-269 on MITRE CWE →

Monitor Improper Privilege Management Vulnerabilities

Get alerted when new Improper Privilege Management CVEs affect your infrastructure.

Start Monitoring Free