CWE-269: Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.
Yearly Trend
Top Affected Vendors
All Improper Privilege Management CVEs (777)
This vulnerability allows attackers to invoke the add_user interface in the system module on GL.iNet devices to gain root privileges. It affects multi...
Jan 3, 2024This vulnerability in TheGreenBow VPN clients allows attackers to escalate privileges by manipulating memory mapped files. Attackers could gain SYSTEM...
Dec 19, 2023This vulnerability allows unauthenticated attackers to impersonate any existing user during device enrollment in Ivanti EPMM (formerly MobileIron Core...
Nov 15, 2023D-Link DIR-820L router firmware version 1.05B03 has insecure permissions that allow unauthorized access to sensitive functions. This vulnerability aff...
Oct 16, 2023This CVE describes a critical privilege escalation vulnerability in Huawei/HarmonyOS window management modules where permissions are not strictly veri...
Oct 11, 2023This CVE-2023-44106 is an API permission management vulnerability in Huawei's Fwk-Display module that allows unauthorized access to display framework ...
Oct 11, 2023This vulnerability allows remote attackers to execute arbitrary code on affected Schneider Electric systems by exploiting improper privilege managemen...
Oct 4, 2023This vulnerability in Service Provider Management System v1.0 allows remote attackers to escalate privileges by manipulating the ID parameter in the a...
Sep 25, 2023This vulnerability in OPSWAT MetaDefender KIOSK allows attackers to abuse built-in Windows features like desktop shortcuts and narrator to escalate pr...
Sep 15, 2023The Donation Forms by Charitable WordPress plugin allows unauthenticated attackers to escalate privileges by specifying their user role during registr...
Aug 23, 2023This vulnerability in RuoYi's CookieRememberMeManager allows remote attackers to escalate privileges by exploiting improper deserialization of remembe...
Aug 11, 2023This CVE describes a Use After Free vulnerability in the Linux kernel's uinput module that allows local attackers to escalate privileges to kernel lev...
Jul 6, 2023This vulnerability in edjing Mix v7.09.01 for Android allows unauthorized apps to manipulate the application's database, leading to privilege escalati...
May 30, 2023This vulnerability allows attackers with valid unprivileged accounts to escalate privileges in Apache InLong. By intercepting login requests and reusi...
May 22, 2023This vulnerability in WHO app versions 1.0.28, 1.0.30, and 1.0.32 allows attackers to escalate privileges via the TTMultiProvider component. Attackers...
Apr 14, 2023A privilege escalation vulnerability in POWERAMP audio player allows remote attackers to gain elevated privileges by manipulating reverb and EQ preset...
Apr 11, 2023CVE-2022-48353 is a configuration vulnerability in some Huawei smartphones that allows kernel privilege escalation when exploited. This can lead to sy...
Mar 27, 2023This vulnerability in Huawei whole-home intelligence software allows attackers to bypass intended privilege restrictions and access restricted functio...
Feb 27, 2023This vulnerability in legacy Axis devices allows remote attackers to bypass privilege management through manipulation of CGI scripts. It affects speci...
Jun 15, 2022This vulnerability allows attackers to escalate privileges in OPSWAT MetaDefender products due to incorrect access control. Affected systems include M...
Jun 9, 2022CVE-2022-31267 is a privilege escalation vulnerability in Gitblit 1.9.2 that allows attackers to gain administrative privileges by injecting control c...
May 21, 2022CVE-2022-26676 is a critical privilege escalation vulnerability in aEnrich a+HRD software where unauthenticated remote attackers can upload and execut...
Apr 7, 2022CVE-2022-24637 is a critical vulnerability in Open Web Analytics (OWA) that allows unauthenticated remote attackers to obtain sensitive user informati...
Mar 18, 2022The MasterStudy LMS WordPress plugin before version 2.7.6 contains an authentication bypass vulnerability that allows unauthenticated attackers to reg...
Mar 7, 2022CVE-2022-25089 is a privilege escalation vulnerability in Printix Secure Cloud Print Management where the software incorrectly uses privileged APIs to...
Mar 3, 2022CVE-2021-22801 is a critical privilege management vulnerability in Schneider Electric's ConneXium Network Manager software that allows authenticated a...
Feb 11, 2022CVE-2021-27664 is a critical vulnerability in exacqVision Server where unauthenticated remote attackers can access stored credentials under certain co...
Oct 11, 2021CVE-2021-38540 is an authentication bypass vulnerability in Apache Airflow's variable import endpoint. Unauthenticated attackers can add or modify Air...
Sep 9, 2021In ownCloud versions before 10.8, a user with access to a federated share and the database can modify permissions to elevate their own privileges. Thi...
Sep 7, 2021CVE-2021-38140 is a privilege escalation vulnerability in the set_user extension for PostgreSQL. It allows authenticated database users to escalate pr...
Aug 10, 2021This vulnerability allows attackers to gain root access on Swisslog Healthcare Nexus Panel devices by using default credentials. It affects HMI3 Contr...
Aug 2, 2021CVE-2021-35064 is a privilege escalation vulnerability in KramerAV VIAWare that allows attackers to gain root access through sudo misconfiguration. Th...
Jul 12, 2021This critical vulnerability in the ProfilePress WordPress plugin allows unauthenticated attackers to register new user accounts with administrator pri...
Jul 7, 2021CVE-2020-28904 is a privilege escalation vulnerability in Nagios Fusion that allows attackers to execute arbitrary PHP code with elevated privileges. ...
May 24, 2021CVE-2020-15390 is an improper access control vulnerability in Pega Platform's pyActivity component that allows unauthenticated attackers to access sen...
Apr 12, 2021This vulnerability allows local attackers to escalate privileges on Windows systems running vulnerable versions of Citrix Gateway Plug-in. Attackers c...
Dec 14, 2020CVE-2020-27654 is an improper access control vulnerability in the lbd service of Synology Router Manager (SRM) that allows remote attackers to execute...
Oct 29, 2020This vulnerability allows remote attackers to bypass authentication in Pexip Infinity's client API and gain elevated privileges. It affects all Pexip ...
Sep 24, 2020This vulnerability allows a remote attacker to escalate privileges to OS-level on ChromeOS devices by tricking a user into opening a malicious file. I...
Aug 25, 2023This vulnerability allows remote attackers to bypass authentication on Swissphone DiCal-RED 4009 devices by using the device password's hash value ins...
Aug 22, 2024This vulnerability in Ultimate Membership Pro WordPress plugin allows unauthenticated attackers to escalate privileges, potentially gaining administra...
Aug 19, 2024This vulnerability in NVIDIA DGX Spark GB10's SROOT component allows attackers with privileged access to bypass SoC (System-on-Chip) protections. Succ...
Nov 25, 2025A privilege escalation vulnerability in snapd's systemd service unit generation allows Docker containers within snaps to gain unintended privileges. W...
Jun 21, 2024This vulnerability allows an existing unprivileged user with valid credentials to log into the standby supervisor module as root, leading to privilege...
Apr 13, 2023CVE-2021-21428 is an insecure temporary file creation vulnerability in openapi-generator-online that allows any user on the system to read and append ...
May 10, 2021A broken access control vulnerability in SolarWinds Serv-U allows domain or group administrators to create system admin users and execute arbitrary co...
Feb 24, 2026A missing validation vulnerability in SolarWinds Serv-U allows administrators to execute arbitrary code. This affects Serv-U deployments where adminis...
Nov 18, 2025This vulnerability allows a privileged user with known credentials to escape CLI restrictions and gain full system control in Dell CloudLink. It affec...
Nov 5, 2025This vulnerability in Rancher allows attackers to escape the chroot jail and gain root access to the Rancher container. In production environments, th...
Apr 16, 2025This vulnerability allows a malicious user to exploit a remote administrative service in FlashArray Purity to create unauthorized privileged accounts ...
Sep 23, 2024About Improper Privilege Management (CWE-269)
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.
Our database tracks 777 CVEs classified as CWE-269, with 165 rated critical and 522 rated high severity. The average CVSS score for Improper Privilege Management vulnerabilities is 8.1.
External reference: View CWE-269 on MITRE CWE →
Monitor Improper Privilege Management Vulnerabilities
Get alerted when new Improper Privilege Management CVEs affect your infrastructure.
Start Monitoring Free