CWE-269: Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.
Yearly Trend
Top Affected Vendors
All Improper Privilege Management CVEs (816)
This vulnerability in BambooHR Build allows remote attackers to perform privilege escalation through an open redirect in the SAML authentication endpo...
Apr 1, 2025This vulnerability in Trend Micro Apex One Security Agent allows a local attacker with low-privileged access to bypass security controls and execute a...
Mar 25, 2025A DLL hijacking vulnerability in AMD Ryzen Master Utility allows attackers to place malicious DLLs in directories where the application searches for t...
Feb 11, 2025CVE-2025-23208 is an authorization bypass vulnerability in Zot OCI image registry where group membership changes from identity providers are not prope...
Jan 17, 2025This vulnerability in Zitadel identity management platform allows deactivated user grants to remain active in tokens, potentially granting unauthorize...
Sep 20, 2024This CVE describes a local privilege escalation vulnerability in ESET security products where an attacker can misuse file operations during quarantine...
Jun 21, 2024This CVE describes a local privilege escalation vulnerability in Ivanti Secure Access Client for Linux that allows authenticated low-privileged users ...
May 31, 2024This vulnerability allows low-privileged users on systems running vulnerable TeamViewer Remote Client versions to elevate privileges by changing perso...
Feb 27, 2024This critical vulnerability in Shenzhen Youkate Industrial Facial Love Cloud Payment System allows remote attackers to bypass privilege management by ...
Nov 13, 2023ASUS Control Center API has broken access control allowing unauthenticated remote attackers to call privileged API functions. This can lead to partial...
Jun 20, 2022This critical vulnerability in Solar-Log energy monitoring systems allows remote attackers to escalate privileges by manipulating flash memory functio...
Jun 9, 2022This critical vulnerability in MONyog Ultimate 6.63 allows remote attackers to escalate privileges by manipulating cookie parameters (HasServerEdit/Is...
Jun 9, 2022This vulnerability allows authenticated low-privileged users on Cisco SD-WAN vManage systems to escalate privileges to root by injecting commands into...
Apr 15, 2022This CVE describes a local privilege escalation vulnerability in Zyxel AP Configurator (ZAC) version 1.1.4, where incorrect directory permissions allo...
Apr 11, 2022CVE-2022-25311 is a privilege escalation vulnerability in Siemens SINEC NMS and SINEMA Server where authenticated low-privileged users can gain higher...
Mar 8, 2022This vulnerability allows a local authenticated attacker to execute arbitrary code with SYSTEM privileges on affected Windows systems. It affects Wind...
Aug 12, 2021CVE-2021-1704 is a privilege escalation vulnerability in Windows Hyper-V that allows an authenticated attacker to execute arbitrary code with SYSTEM p...
Jan 12, 2021CVE-2021-1706 is a local privilege escalation vulnerability in Windows LUAFV (Local User Authority File Virtualization) driver that allows authenticat...
Jan 12, 2021CVE-2021-1685 is an elevation of privilege vulnerability in Windows AppX Deployment Extensions that allows authenticated attackers to execute code wit...
Jan 12, 2021This vulnerability allows attackers to escalate privileges to root and read/write arbitrary files on Cohesity TranZman Migration Appliance systems due...
Mar 3, 2026This vulnerability allows low-privilege API keys in Immich to escalate their own permissions by calling the update endpoint, granting themselves full ...
Jan 29, 2026This vulnerability allows a physically proximate attacker to edit the Legacy GRUB bootloader configuration on affected Entrust nShield HSM devices, en...
Dec 2, 2025This vulnerability allows authenticated Nagios XI administrators to escalate their privileges to root on the underlying host system by abusing the Mig...
Nov 3, 2025A privilege escalation vulnerability allows non-primary administrators with web interface access but no shell permissions to view the master admin pas...
Aug 26, 2025This vulnerability in Ocuco Innovation's JOBMANAGER.EXE allows attackers to bypass authentication and gain Administrator privileges by sending a speci...
May 22, 2025A privilege escalation vulnerability in OrangeHRM v5.7 allows attackers to bypass authentication via PHP loose-equality comparisons if a specific MD5 ...
May 21, 2025The Post Meta Data Manager WordPress plugin allows authenticated attackers with Administrator access to escalate privileges on multisite installations...
Mar 8, 2025This vulnerability in the CTX Feed WordPress plugin allows attackers to update arbitrary WordPress options due to improper privilege management. It en...
Aug 1, 2024CVE-2024-3325 is an improper privilege management vulnerability (CWE-269) in Jaspersoft JasperReport Servers that allows authenticated users to escala...
Jul 10, 2024This vulnerability in the WPFactory EAN for WooCommerce WordPress plugin allows attackers to update arbitrary WordPress options, leading to privilege ...
May 17, 2024This vulnerability in the WordPress Instant Images plugin allows attackers to update arbitrary WordPress options, potentially leading to privilege esc...
May 17, 2024This vulnerability allows attackers to escalate privileges in the WebToffee WooCommerce PDF plugin, potentially gaining administrative access to WordP...
May 17, 2024This vulnerability allows authenticated WordPress users to escalate their privileges to administrator level through the WP User Frontend plugin. It af...
May 17, 2024This vulnerability allows attackers with administrative access to VMware Avi Load Balancer to escalate privileges to root on the host system, enabling...
May 8, 2024This vulnerability in Dell SupportAssist for Home PCs allows local attackers to escalate privileges during first-time installations. Only users who pe...
Feb 14, 2024CVE-2023-5408 is a privilege escalation vulnerability in OpenShift's Kubernetes API server node restriction admission plugin. A remote attacker who ca...
Nov 2, 2023This vulnerability allows remote attackers with knowledge of the SNMPv2 read/write community string to execute arbitrary system commands with root pri...
Aug 9, 2023The Company admin role in eZ Platform Ibexa Kernel before version 1.3.26 grants excessive privileges, allowing users with this role to perform unautho...
Mar 12, 2023This vulnerability in SUSE Rancher allows authenticated users with 'escalate' permissions on PRTBs (Project Role Template Bindings) to escalate their ...
Feb 7, 2023This vulnerability allows users with the restricted-admin role in SUSE Rancher to escalate their privileges to full administrator access. It affects S...
May 2, 2022CVE-2021-43835 is a privilege escalation vulnerability in Sulu CMS where authenticated users with any admin UI access can exploit the ProfileControlle...
Dec 15, 2021This vulnerability in IBM Event Streams allows a user with access to the CA private key to create their own certificates, deploy them in the cluster, ...
Jul 12, 2021This CVE describes an improper verification vulnerability in Huawei email applications that could allow attackers to access sensitive information. The...
Mar 5, 2026This vulnerability allows a standard local user without administrative privileges to execute privileged update commands via Microsoft Edge's Elevation...
Jan 16, 2026In self-hosted n8n instances prior to version 2.0.0, authenticated users with workflow editing access can exploit the Code node's legacy JavaScript ex...
Dec 26, 2025This vulnerability in ETSI Open-Source MANO (OSM) allows remote authenticated attackers to escalate privileges through the /osm/admin/v1/users API end...
Jul 25, 2025This vulnerability allows an attacker with control over a content process to abuse the privileged UITour actor, potentially leading to information dis...
Apr 29, 2025The Bricks WordPress theme has a privilege escalation vulnerability that allows authenticated attackers with contributor-level access to execute arbit...
Feb 27, 2025A privilege escalation vulnerability in Cloudflare WARP for Windows allows low-privileged users to create symbolic links that cause the WARP service (...
Jan 22, 2025This vulnerability allows authenticated users with common permissions to intercept password change requests and modify administrator credentials on ZT...
Aug 8, 2024About Improper Privilege Management (CWE-269)
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.
Our database tracks 816 CVEs classified as CWE-269, with 170 rated critical and 556 rated high severity. The average CVSS score for Improper Privilege Management vulnerabilities is 8.1.
External reference: View CWE-269 on MITRE CWE →
Monitor Improper Privilege Management Vulnerabilities
Get alerted when new Improper Privilege Management CVEs affect your infrastructure.
Start Monitoring Free