CWE-269: Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.

762
Total CVEs
164
Critical
508
High
8.1
Avg CVSS
1
In CISA KEV

Yearly Trend

2026
49
2025
213
2024
225
2023
118
2022
49

Top Affected Vendors

1 Microsoft 58
2 Google 44
3 Huawei 25
4 Apple 20
5 Oracle 19
6 Trendmicro 13
7 Dell 10
8 Fortinet 8
9 Apache 7
10 Citrix 7

All Improper Privilege Management CVEs (762)

CVE-2025-6758
9.8

This vulnerability allows unauthenticated attackers to register as administrators on WordPress sites using the Real Spaces theme. Attackers can gain f...

Aug 19, 2025
CVE-2025-8660
9.8

CVE-2025-8660 is a critical privilege escalation vulnerability in Broadcom software that allows authenticated users to gain elevated privileges beyond...

Aug 11, 2025
CVE-2025-6994
9.8

The Reveal Listing WordPress plugin allows unauthenticated attackers to register accounts with administrator privileges by manipulating the 'listing_u...

Aug 6, 2025
CVE-2025-5954
9.8

The Service Finder SMS System WordPress plugin allows unauthenticated attackers to register administrator accounts due to improper user role validatio...

Aug 1, 2025
CVE-2025-6934
EPSS 17.5% 9.8

This vulnerability allows unauthenticated attackers to register accounts with Administrator privileges on WordPress sites using the Opal Estate Pro pl...

Jul 1, 2025
CVE-2025-4334
EPSS 26.5% 9.8

The Simple User Registration plugin for WordPress has a privilege escalation vulnerability that allows unauthenticated attackers to register as admini...

Jun 26, 2025
CVE-2025-3278
9.8

The UrbanGo Membership WordPress plugin allows unauthenticated attackers to register accounts with administrator privileges by manipulating the user_r...

Apr 19, 2025
CVE-2025-28399
9.8

A privilege escalation vulnerability in Erick xmall v1.1 and earlier allows remote attackers to gain elevated privileges through the updateAddress met...

Apr 15, 2025
CVE-2025-22937
9.8

This vulnerability in Adtran 411 ONT devices allows attackers to escalate privileges from a lower-privileged user to administrative access. It affects...

Mar 31, 2025
CVE-2025-2232
9.8

This vulnerability allows unauthenticated attackers to register administrator accounts on WordPress sites using the Realteo plugin with Findeo Theme. ...

Mar 14, 2025
CVE-2025-0177
9.8

The Javo Core WordPress plugin allows unauthenticated attackers to create accounts with administrator privileges due to improper role assignment durin...

Mar 8, 2025
CVE-2024-11951
9.8

The Homey Login Register WordPress plugin allows unauthenticated attackers to create accounts with administrator privileges in versions up to 2.4.0. T...

Mar 5, 2025
CVE-2024-57602
9.8

A privilege escalation vulnerability in EasyAppointments v1.5.0 allows remote attackers to gain elevated privileges through the index.php file. This a...

Feb 12, 2025
CVE-2025-0180
9.8

The WP Foodbakery WordPress plugin has a privilege escalation vulnerability that allows unauthenticated attackers to register as administrators. This ...

Feb 11, 2025
CVE-2024-9636
9.8

The Post Grid and Gutenberg Blocks WordPress plugin allows unauthenticated attackers to register as administrators due to improper user meta validatio...

Jan 15, 2025
CVE-2024-9518
9.8

The UserPlus WordPress plugin up to version 2.0 contains a privilege escalation vulnerability that allows unauthenticated attackers to assign themselv...

Oct 10, 2024
CVE-2024-3057
9.8

This vulnerability allows authenticated users to escalate privileges on Pure Storage FlashArray systems by making specific API calls. It affects admin...

Oct 8, 2024
CVE-2024-44097
9.8

This vulnerability allows attackers to perform man-in-the-middle attacks on TLS connections due to improper certificate validation. Any application or...

Oct 2, 2024
CVE-2024-9265
9.8

The Echo RSS Feed Post Generator WordPress plugin allows unauthenticated attackers to register administrator accounts due to improper role restriction...

Oct 1, 2024
CVE-2024-34331
9.8

This vulnerability in Parallels Desktop for Mac allows attackers to escalate privileges to root by exploiting a lack of code signature verification in...

Sep 23, 2024
CVE-2024-8853
9.8

The Webo-facto WordPress plugin up to version 1.40 contains a privilege escalation vulnerability that allows unauthenticated attackers to gain adminis...

Sep 20, 2024
CVE-2024-44893
9.8

This vulnerability in JimuReport v1.7.8 allows attackers to escalate privileges via a crafted GET request to the /jeecg-boot/jmreport/dict/list endpoi...

Sep 10, 2024
CVE-2024-7493
9.8

The WPCOM Member WordPress plugin allows unauthenticated attackers to register as administrators due to improper input validation. This affects all Wo...

Sep 6, 2024
CVE-2024-43245
9.8

An unauthenticated privilege escalation vulnerability in the eyecix JobSearch WordPress plugin allows attackers to take over administrator accounts wi...

Aug 19, 2024
CVE-2024-44076
9.8

This vulnerability allows non-administrator users to access import/export endpoints in Microcks, potentially enabling unauthorized data manipulation o...

Aug 19, 2024
CVE-2024-38770
9.8

This vulnerability in the WordPress plugin 'Backup and Staging by WP Time Capsule' allows attackers to bypass authentication and escalate privileges, ...

Aug 1, 2024
CVE-2024-37927
9.8

CVE-2024-37927 is an unauthenticated privilege escalation vulnerability in the NooTheme Jobmonster WordPress theme. Attackers can exploit this flaw to...

Jul 12, 2024
CVE-2024-33374
9.8

This vulnerability allows attackers to gain root access to the LB-LINK BL-W1210M v2.0 router via its UART/serial interface without authentication. Any...

Jun 14, 2024
CVE-2024-35700
9.8

This vulnerability in the UserPro WordPress plugin allows unauthenticated attackers to escalate privileges and take over user accounts. It affects all...

Jun 4, 2024
CVE-2024-33552
9.8

This vulnerability allows unauthenticated attackers to escalate privileges in the XStore Core WordPress plugin. Attackers can gain administrative acce...

May 17, 2024
CVE-2024-32511
9.8

This vulnerability allows unauthenticated attackers to escalate privileges in the Astoundify Simple Registration for WooCommerce WordPress plugin. Att...

May 17, 2024
CVE-2024-31290
9.8

This vulnerability allows unauthenticated attackers to escalate privileges in the Demo My WordPress plugin, potentially gaining administrative access ...

May 17, 2024
CVE-2024-30542
9.8

This vulnerability allows unauthenticated attackers to escalate privileges in the WholesaleX WordPress plugin. Attackers can gain administrative acces...

May 17, 2024
CVE-2024-24882
9.8

CVE-2024-24882 is an improper privilege management vulnerability in Masteriyo LMS WordPress plugin that allows attackers to escalate privileges, poten...

May 17, 2024
CVE-2024-22157
9.8

CVE-2024-22157 is an unauthenticated privilege escalation vulnerability in the SalesKing WordPress plugin. Attackers can exploit this to gain administ...

May 17, 2024
CVE-2023-51481
9.8

This vulnerability allows unauthenticated attackers to escalate privileges and take over accounts in the Local Delivery Drivers for WooCommerce WordPr...

May 17, 2024
CVE-2023-51424
9.8

CVE-2023-51424 is an unauthenticated privilege escalation vulnerability in the WebinarIgnition WordPress plugin. Attackers can exploit this flaw to ga...

May 17, 2024
CVE-2023-37999
9.8

This vulnerability allows unauthenticated attackers to escalate privileges in the HT Mega WordPress plugin. Attackers can gain administrative access t...

May 17, 2024
CVE-2023-32244
9.8

This vulnerability in the XTemos Woodmart Core WordPress plugin allows attackers to escalate privileges due to improper privilege management. Attacker...

May 17, 2024
CVE-2023-26540
9.8

This CVE describes an improper privilege management vulnerability in the Favethemes Houzez WordPress theme that allows attackers to escalate privilege...

May 17, 2024
CVE-2023-26009
9.8

This vulnerability in the Houzez Login Register WordPress plugin allows attackers to escalate privileges due to improper privilege management. Attacke...

May 17, 2024
CVE-2024-33775
9.8

A privilege escalation vulnerability in Nagios XI's Autodiscover component allows remote attackers to execute arbitrary code via crafted Dashlets. Thi...

May 1, 2024
CVE-2023-51425
9.8

This vulnerability allows unauthenticated attackers to escalate privileges in the Rencontre WordPress dating site plugin, potentially taking over any ...

Apr 24, 2024
CVE-2024-32418
9.8

This vulnerability in flusity CMS v2.33 allows remote attackers to execute arbitrary code through the add_addon.php component, leading to complete sys...

Apr 22, 2024
CVE-2024-29667
9.8

This SQL injection vulnerability in Tongtianxing Technology's CMSV6 vehicle monitoring platform allows remote attackers to execute arbitrary SQL comma...

Mar 29, 2024
CVE-2023-49232
9.8

CVE-2023-49232 is an authentication bypass vulnerability in Stilog Visual Planning 8 that allows unauthenticated attackers to brute-force password res...

Mar 29, 2024
CVE-2023-38944
9.8

This vulnerability allows attackers to bypass access controls in Multilaser RE160V and RE163V routers by modifying an HTTP header, granting complete a...

Mar 6, 2024
CVE-2024-25847
9.8

This SQL injection vulnerability in MyPrestaModules' Product Catalog Import module for PrestaShop allows attackers to execute arbitrary SQL commands. ...

Mar 3, 2024
CVE-2023-47132
9.8

This vulnerability in N-able N-central allows attackers to escalate privileges through API calls, potentially gaining administrative access. It affect...

Feb 8, 2024
CVE-2024-22922
9.8

CVE-2024-22922 is a privilege escalation vulnerability in Projectworlds Visitor Management System in PHP v1.0 that allows remote attackers to gain adm...

Jan 25, 2024

About Improper Privilege Management (CWE-269)

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.

Our database tracks 762 CVEs classified as CWE-269, with 164 rated critical and 508 rated high severity. The average CVSS score for Improper Privilege Management vulnerabilities is 8.1.

External reference: View CWE-269 on MITRE CWE →

Monitor Improper Privilege Management Vulnerabilities

Get alerted when new Improper Privilege Management CVEs affect your infrastructure.

Start Monitoring Free