CWE-269: Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.
Yearly Trend
Top Affected Vendors
All Improper Privilege Management CVEs (762)
This vulnerability allows unauthenticated attackers to register as administrators on WordPress sites using the Real Spaces theme. Attackers can gain f...
Aug 19, 2025CVE-2025-8660 is a critical privilege escalation vulnerability in Broadcom software that allows authenticated users to gain elevated privileges beyond...
Aug 11, 2025The Reveal Listing WordPress plugin allows unauthenticated attackers to register accounts with administrator privileges by manipulating the 'listing_u...
Aug 6, 2025The Service Finder SMS System WordPress plugin allows unauthenticated attackers to register administrator accounts due to improper user role validatio...
Aug 1, 2025This vulnerability allows unauthenticated attackers to register accounts with Administrator privileges on WordPress sites using the Opal Estate Pro pl...
Jul 1, 2025The Simple User Registration plugin for WordPress has a privilege escalation vulnerability that allows unauthenticated attackers to register as admini...
Jun 26, 2025The UrbanGo Membership WordPress plugin allows unauthenticated attackers to register accounts with administrator privileges by manipulating the user_r...
Apr 19, 2025A privilege escalation vulnerability in Erick xmall v1.1 and earlier allows remote attackers to gain elevated privileges through the updateAddress met...
Apr 15, 2025This vulnerability in Adtran 411 ONT devices allows attackers to escalate privileges from a lower-privileged user to administrative access. It affects...
Mar 31, 2025This vulnerability allows unauthenticated attackers to register administrator accounts on WordPress sites using the Realteo plugin with Findeo Theme. ...
Mar 14, 2025The Javo Core WordPress plugin allows unauthenticated attackers to create accounts with administrator privileges due to improper role assignment durin...
Mar 8, 2025The Homey Login Register WordPress plugin allows unauthenticated attackers to create accounts with administrator privileges in versions up to 2.4.0. T...
Mar 5, 2025A privilege escalation vulnerability in EasyAppointments v1.5.0 allows remote attackers to gain elevated privileges through the index.php file. This a...
Feb 12, 2025The WP Foodbakery WordPress plugin has a privilege escalation vulnerability that allows unauthenticated attackers to register as administrators. This ...
Feb 11, 2025The Post Grid and Gutenberg Blocks WordPress plugin allows unauthenticated attackers to register as administrators due to improper user meta validatio...
Jan 15, 2025The UserPlus WordPress plugin up to version 2.0 contains a privilege escalation vulnerability that allows unauthenticated attackers to assign themselv...
Oct 10, 2024This vulnerability allows authenticated users to escalate privileges on Pure Storage FlashArray systems by making specific API calls. It affects admin...
Oct 8, 2024This vulnerability allows attackers to perform man-in-the-middle attacks on TLS connections due to improper certificate validation. Any application or...
Oct 2, 2024The Echo RSS Feed Post Generator WordPress plugin allows unauthenticated attackers to register administrator accounts due to improper role restriction...
Oct 1, 2024This vulnerability in Parallels Desktop for Mac allows attackers to escalate privileges to root by exploiting a lack of code signature verification in...
Sep 23, 2024The Webo-facto WordPress plugin up to version 1.40 contains a privilege escalation vulnerability that allows unauthenticated attackers to gain adminis...
Sep 20, 2024This vulnerability in JimuReport v1.7.8 allows attackers to escalate privileges via a crafted GET request to the /jeecg-boot/jmreport/dict/list endpoi...
Sep 10, 2024The WPCOM Member WordPress plugin allows unauthenticated attackers to register as administrators due to improper input validation. This affects all Wo...
Sep 6, 2024An unauthenticated privilege escalation vulnerability in the eyecix JobSearch WordPress plugin allows attackers to take over administrator accounts wi...
Aug 19, 2024This vulnerability allows non-administrator users to access import/export endpoints in Microcks, potentially enabling unauthorized data manipulation o...
Aug 19, 2024This vulnerability in the WordPress plugin 'Backup and Staging by WP Time Capsule' allows attackers to bypass authentication and escalate privileges, ...
Aug 1, 2024CVE-2024-37927 is an unauthenticated privilege escalation vulnerability in the NooTheme Jobmonster WordPress theme. Attackers can exploit this flaw to...
Jul 12, 2024This vulnerability allows attackers to gain root access to the LB-LINK BL-W1210M v2.0 router via its UART/serial interface without authentication. Any...
Jun 14, 2024This vulnerability in the UserPro WordPress plugin allows unauthenticated attackers to escalate privileges and take over user accounts. It affects all...
Jun 4, 2024This vulnerability allows unauthenticated attackers to escalate privileges in the XStore Core WordPress plugin. Attackers can gain administrative acce...
May 17, 2024This vulnerability allows unauthenticated attackers to escalate privileges in the Astoundify Simple Registration for WooCommerce WordPress plugin. Att...
May 17, 2024This vulnerability allows unauthenticated attackers to escalate privileges in the Demo My WordPress plugin, potentially gaining administrative access ...
May 17, 2024This vulnerability allows unauthenticated attackers to escalate privileges in the WholesaleX WordPress plugin. Attackers can gain administrative acces...
May 17, 2024CVE-2024-24882 is an improper privilege management vulnerability in Masteriyo LMS WordPress plugin that allows attackers to escalate privileges, poten...
May 17, 2024CVE-2024-22157 is an unauthenticated privilege escalation vulnerability in the SalesKing WordPress plugin. Attackers can exploit this to gain administ...
May 17, 2024This vulnerability allows unauthenticated attackers to escalate privileges and take over accounts in the Local Delivery Drivers for WooCommerce WordPr...
May 17, 2024CVE-2023-51424 is an unauthenticated privilege escalation vulnerability in the WebinarIgnition WordPress plugin. Attackers can exploit this flaw to ga...
May 17, 2024This vulnerability allows unauthenticated attackers to escalate privileges in the HT Mega WordPress plugin. Attackers can gain administrative access t...
May 17, 2024This vulnerability in the XTemos Woodmart Core WordPress plugin allows attackers to escalate privileges due to improper privilege management. Attacker...
May 17, 2024This CVE describes an improper privilege management vulnerability in the Favethemes Houzez WordPress theme that allows attackers to escalate privilege...
May 17, 2024This vulnerability in the Houzez Login Register WordPress plugin allows attackers to escalate privileges due to improper privilege management. Attacke...
May 17, 2024A privilege escalation vulnerability in Nagios XI's Autodiscover component allows remote attackers to execute arbitrary code via crafted Dashlets. Thi...
May 1, 2024This vulnerability allows unauthenticated attackers to escalate privileges in the Rencontre WordPress dating site plugin, potentially taking over any ...
Apr 24, 2024This vulnerability in flusity CMS v2.33 allows remote attackers to execute arbitrary code through the add_addon.php component, leading to complete sys...
Apr 22, 2024This SQL injection vulnerability in Tongtianxing Technology's CMSV6 vehicle monitoring platform allows remote attackers to execute arbitrary SQL comma...
Mar 29, 2024CVE-2023-49232 is an authentication bypass vulnerability in Stilog Visual Planning 8 that allows unauthenticated attackers to brute-force password res...
Mar 29, 2024This vulnerability allows attackers to bypass access controls in Multilaser RE160V and RE163V routers by modifying an HTTP header, granting complete a...
Mar 6, 2024This SQL injection vulnerability in MyPrestaModules' Product Catalog Import module for PrestaShop allows attackers to execute arbitrary SQL commands. ...
Mar 3, 2024This vulnerability in N-able N-central allows attackers to escalate privileges through API calls, potentially gaining administrative access. It affect...
Feb 8, 2024CVE-2024-22922 is a privilege escalation vulnerability in Projectworlds Visitor Management System in PHP v1.0 that allows remote attackers to gain adm...
Jan 25, 2024About Improper Privilege Management (CWE-269)
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.
Our database tracks 762 CVEs classified as CWE-269, with 164 rated critical and 508 rated high severity. The average CVSS score for Improper Privilege Management vulnerabilities is 8.1.
External reference: View CWE-269 on MITRE CWE →
Monitor Improper Privilege Management Vulnerabilities
Get alerted when new Improper Privilege Management CVEs affect your infrastructure.
Start Monitoring Free