CWE-269: Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.

802
Total CVEs
166
Critical
546
High
8.1
Avg CVSS
1
In CISA KEV

Yearly Trend

2026
50
2025
213
2024
225
2023
118
2022
49

Top Affected Vendors

1 Microsoft 81
2 Google 46
3 Huawei 26
4 Apple 20
5 Oracle 19
6 Trendmicro 13
7 Dell 11
8 Fortinet 8
9 Apache 7
10 Citrix 7

All Improper Privilege Management CVEs (802)

CVE-2024-12398
8.8

An authenticated user with limited privileges can escalate to administrator level on affected Zyxel devices, allowing them to upload configuration fil...

Jan 14, 2025
CVE-2020-15934
8.8

A local privilege escalation vulnerability in FortiClient for Linux allows local users to execute arbitrary code with root privileges by exploiting th...

Dec 19, 2024
CVE-2024-38499
8.8

CA Client Automation (ITCM) allows non-admin users to encrypt strings using CAF CLI and SD_ACMD CLI, potentially exposing critical encryption keys. Th...

Dec 17, 2024
CVE-2024-9192
8.8

This vulnerability allows authenticated WordPress users with subscriber-level access or higher to escalate their privileges to administrator by exploi...

Nov 16, 2024
CVE-2024-24409
8.8

This vulnerability allows authenticated users with limited permissions in ManageEngine ADManager Plus to escalate privileges through the Modify Comput...

Nov 8, 2024
CVE-2024-45373
8.8

This vulnerability allows authenticated users of the ProGauge MAGLINK LX4 CONSOLE to escalate their privileges to administrator level. This affects al...

Sep 25, 2024
CVE-2024-6482
8.8

This vulnerability in the Login with phone number WordPress plugin allows authenticated attackers with Subscriber-level access or higher to escalate t...

Sep 14, 2024
CVE-2024-37980
8.8

This vulnerability in Microsoft SQL Server allows authenticated attackers to elevate their privileges within the database system. Attackers could gain...

Sep 10, 2024
CVE-2024-8247
8.8

The Newsletters plugin for WordPress allows authenticated users with subscriber-level access or higher to escalate privileges to administrator by mani...

Sep 6, 2024
CVE-2024-43403
8.8

CVE-2024-43403 is a privilege escalation vulnerability in Kanister's Kubernetes operator where the default ClusterRoleBinding grants excessive permiss...

Aug 20, 2024
CVE-2024-33894
8.8

Cosy+ industrial remote access gateways running vulnerable firmware versions execute multiple processes with excessive privileges, allowing attackers ...

Aug 2, 2024
CVE-2024-27181
8.8

Apache Linkis versions up to 1.5.0 contain a privilege escalation vulnerability where trusted accounts can access token information they shouldn't hav...

Aug 2, 2024
CVE-2024-39633
8.8

This vulnerability allows authenticated users with 'contributor' role or higher to escalate their privileges to administrator level in WordPress sites...

Aug 1, 2024
CVE-2024-37952
8.8

This vulnerability allows attackers with subscriber-level access in WordPress to escalate their privileges to administrator level in the BookYourTrave...

Jul 9, 2024
CVE-2024-37484
8.8

This vulnerability allows attackers to escalate privileges in the Zephyr Project Manager WordPress plugin, enabling unauthorized users to gain adminis...

Jul 9, 2024
CVE-2024-37455
8.8

This vulnerability allows attackers to escalate privileges in WordPress sites using the Ultimate Addons for Elementor plugin. Attackers can gain admin...

Jul 9, 2024
CVE-2024-27711
8.8

This vulnerability in Eskooly Free Online School Management Software allows remote attackers to escalate privileges through the sign-up process. It af...

Jul 5, 2024
CVE-2024-36586
8.8

This vulnerability allows unprivileged attackers to overwrite the AdGuardHome binary, enabling privilege escalation to root/admin access. It affects A...

Jun 13, 2024
CVE-2024-37665
8.8

An access control vulnerability in Wvp GB28181 Pro 2.0 allows authenticated attackers to escalate privileges to Administrator via a crafted POST reque...

Jun 12, 2024
CVE-2024-36077
8.8

CVE-2024-36077 is a privilege escalation vulnerability in Qlik Sense Enterprise for Windows where improper validation allows remote attackers to eleva...

May 22, 2024
CVE-2024-32960
8.8

This vulnerability in the Booking Ultra Pro WordPress plugin allows attackers to escalate privileges, potentially gaining administrative access. It af...

May 17, 2024
CVE-2024-33549
8.8

This vulnerability in the AA-Team WZone WordPress plugin allows attackers to escalate privileges, potentially gaining administrative access. It affect...

May 17, 2024
CVE-2024-32507
8.8

This vulnerability in the WordPress 'Login with phone number' plugin allows attackers to escalate privileges due to improper privilege management. Att...

May 17, 2024
CVE-2024-22145
8.8

This vulnerability in the InstaWP Connect WordPress plugin allows attackers to update arbitrary WordPress options, leading to privilege escalation. At...

May 17, 2024
CVE-2023-51479
8.8

This CVE describes an authenticated privilege escalation vulnerability in the WordPress Build App Online plugin. Authenticated users can exploit impro...

May 17, 2024
CVE-2023-51398
8.8

This vulnerability allows attackers to escalate privileges in WordPress sites using the Ultimate Addons for Beaver Builder plugin. Attackers could gai...

May 17, 2024
CVE-2023-50890
8.8

This vulnerability allows attackers to escalate privileges in WordPress sites using the Ultimate Addons for Elementor plugin. Attackers can gain admin...

May 17, 2024
CVE-2023-48757
8.8

This vulnerability in Crocoblock's JetEngine WordPress plugin allows attackers to escalate privileges due to improper privilege management. Attackers ...

May 17, 2024
CVE-2023-47782
8.8

This vulnerability allows authenticated WordPress users with lower privileges to escalate their permissions to administrator level in Thrive Theme Bui...

May 17, 2024
CVE-2023-46145
8.8

This vulnerability in the Themify Ultra WordPress theme allows authenticated users to escalate their privileges to administrator level. It affects Wor...

May 17, 2024
CVE-2023-41665
8.8

CVE-2023-41665 is an improper privilege management vulnerability in the GiveWP WordPress plugin that allows authenticated attackers with GiveWP Manage...

May 17, 2024
CVE-2023-41955
8.8

This vulnerability allows contributors on WordPress sites using Essential Addons for Elementor to escalate their privileges to administrator level. It...

May 17, 2024
CVE-2023-37389
8.8

This vulnerability allows unauthenticated attackers to escalate privileges in the SAASPROJECT Booking Package WordPress plugin. Attackers can gain adm...

May 17, 2024
CVE-2023-33327
8.8

This vulnerability allows attackers to escalate privileges in the Leyka WordPress plugin, potentially gaining administrative access. It affects all Le...

May 14, 2024
CVE-2024-4017
8.8

This vulnerability allows DLL side-loading in BeyondTrust U-Series Appliance on Windows 64-bit systems due to improper privilege management. Attackers...

Apr 19, 2024
CVE-2024-32003
8.8

The wn-dusk-plugin for Winter CMS contains an authentication bypass vulnerability that allows unauthenticated attackers to log in as any user in the B...

Apr 12, 2024
CVE-2024-1138
8.8

This vulnerability in TIBCO FTL Server allows low-privileged attackers with network access to escalate privileges on affected systems. It affects TIBC...

Mar 12, 2024
CVE-2024-0439
8.8

This CVE describes an improper privilege management vulnerability in Anything-LLM where managers can bypass UI restrictions and modify restricted sett...

Feb 26, 2024
CVE-2024-0622
8.8

This CVE describes a local privilege escalation vulnerability in OpenText Operations Agent on non-Windows platforms. An authenticated local user could...

Feb 15, 2024
CVE-2023-45581
8.8

A privilege escalation vulnerability in Fortinet FortiClientEMS allows site administrators with Super Admin privileges to perform global administrativ...

Feb 15, 2024
CVE-2024-24747
8.8

This CVE describes a privilege escalation vulnerability in MinIO where newly created access keys inherit admin permissions from parent keys, allowing ...

Jan 31, 2024
CVE-2024-21888
8.8

This vulnerability allows authenticated users of Ivanti Connect Secure and Ivanti Policy Secure to escalate their privileges to administrator level. I...

Jan 31, 2024
CVE-2023-43317
8.8

This vulnerability allows remote attackers to escalate privileges in Coign CRM Portal v.06.06 by manipulating the userPermissionsList parameter in the...

Jan 24, 2024
CVE-2023-44250
8.8

This vulnerability allows authenticated attackers in Fortinet FortiOS and FortiProxy HA clusters to perform elevated actions through crafted HTTP/HTTP...

Jan 10, 2024
CVE-2023-41119
8.8

This vulnerability in EnterpriseDB Postgres Advanced Server allows authenticated database users to escalate their privileges to superuser level by exp...

Dec 12, 2023
CVE-2023-27316
8.8

This vulnerability allows authenticated SnapCenter Server users to escalate privileges to admin level on remote systems where SnapCenter plug-ins are ...

Oct 12, 2023
CVE-2023-43960
8.8

This vulnerability in D-LINK DPH-400SE allows remote attackers to escalate privileges through the User Modify function in the Maintenance/Access compo...

Oct 11, 2023
CVE-2023-36628
8.8

This vulnerability allows users with VMware admin access on a FlashArray to escalate privileges to root through VASA. It affects VMware vSphere/ESXi e...

Oct 3, 2023
CVE-2023-40918
8.8

CVE-2023-40918 allows unauthorized users to create new administrator accounts in KnowStreaming 3.3.0, leading to privilege escalation. This affects al...

Sep 5, 2023
CVE-2023-2833
8.8

The ReviewX WordPress plugin up to version 1.6.13 contains a privilege escalation vulnerability that allows authenticated users with minimal permissio...

Jun 6, 2023

About Improper Privilege Management (CWE-269)

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control.

Our database tracks 802 CVEs classified as CWE-269, with 166 rated critical and 546 rated high severity. The average CVSS score for Improper Privilege Management vulnerabilities is 8.1.

External reference: View CWE-269 on MITRE CWE →

Monitor Improper Privilege Management Vulnerabilities

Get alerted when new Improper Privilege Management CVEs affect your infrastructure.

Start Monitoring Free