CWE-281: CWE-281

89
Total CVEs
14
Critical
53
High
7.6
Avg CVSS

Yearly Trend

2026
1
2025
35
2024
26
2023
13
2022
5

Top Affected Vendors

1 Apple 14
2 Google 6
3 Mozilla 4
4 Silabs 3
5 Fedoraproject 3
6 Redhat 3
7 Openatom 3
8 Debian 2
9 Zucchetti 2
10 Ibm 2

All CWE-281 CVEs (89)

CVE-2024-53934
7.7

This vulnerability allows any Android application without permissions to place phone calls without user interaction by sending a crafted intent to the...

Jan 6, 2025
CVE-2021-21379
7.7

This CVE allows privilege escalation in XWiki Platform where the {{wikimacrocontent}} executes content with wiki macro author rights instead of caller...

Mar 12, 2021
CVE-2024-12125
7.5

This vulnerability in the 3scale Developer Portal allows attackers to modify read-only or hidden fields when creating or updating accounts. This could...

Nov 6, 2025
CVE-2025-43697
7.5

A vulnerability in Salesforce OmniStudio DataMapper allows unauthorized access to encrypted data due to improper permission preservation. This affects...

Jun 10, 2025
CVE-2025-43700
7.5

A permissions preservation vulnerability in Salesforce OmniStudio FlexCards allows unauthorized access to encrypted data. This affects Salesforce cust...

Jun 10, 2025
CVE-2024-54557
7.5

This CVE describes a logic flaw in macOS that allows attackers to bypass file system protections and access restricted areas. It affects macOS Ventura...

Jan 27, 2025
CVE-2024-37575
7.5

This vulnerability in the Should I Answer? Android app allows any installed application without permissions to place phone calls without user interact...

Dec 4, 2024
CVE-2024-10458
7.5

This vulnerability allows a malicious website to bypass same-origin policy restrictions via embedded content, potentially accessing sensitive data fro...

Oct 29, 2024
CVE-2024-40770
7.5

This CVE describes a privilege escalation vulnerability in macOS where a non-privileged user can modify restricted network settings. This affects macO...

Sep 17, 2024
CVE-2024-27795
7.5

This macOS vulnerability allows camera extensions to bypass intended restrictions and access the internet without proper authorization. It affects mac...

Sep 17, 2024
CVE-2021-3523
7.5

CVE-2021-3523 is a connection reuse vulnerability in 3Scale APICast that allows attackers to bypass API security restrictions when multiple APIs are h...

Apr 27, 2022
CVE-2021-37006
7.5

This CVE describes an Improper Preservation of Permissions vulnerability in Huawei smartphones running HarmonyOS. It allows unauthorized access to sen...

Nov 23, 2021
CVE-2021-30482
7.5

This vulnerability in JetBrains UpSource allows application passwords to remain valid after they should have been revoked, potentially enabling unauth...

May 11, 2021
CVE-2024-23464
7.2

This vulnerability allows administrators with PowerShell access to disable Zscaler Internet Access (ZIA) protection on Windows systems. It affects org...

Aug 6, 2024
CVE-2024-40821
7.1

This CVE describes a sandbox escape vulnerability in macOS where third-party app extensions may not receive proper sandbox restrictions. This could al...

Jul 29, 2024
CVE-2023-31926
7.1

This vulnerability in Brocade Fabric OS allows local users to overwrite system files using the 'less' command. It affects Brocade SAN switches running...

Aug 2, 2023
CVE-2023-39902
7.0

This vulnerability allows attackers to craft malicious Flattened Image Tree (FIT) structures that overwrite memory in U-Boot's Secondary Program Loade...

Oct 17, 2023
CVE-2024-56178
6.5

This vulnerability allows users with the security_admin_local role in Couchbase Server to create new users with admin privileges, bypassing intended r...

Jan 27, 2025
CVE-2024-50921
6.5

Insecure permissions in Silicon Labs Z-Wave Series 700 and 800 controllers allow attackers to cause denial of service by repeatedly sending crafted pa...

Dec 10, 2024
CVE-2024-50928
6.5

This vulnerability allows attackers to manipulate wakeup intervals of Z-Wave end devices in controller memory, potentially disrupting communication be...

Dec 10, 2024
CVE-2024-4768
6.1

This vulnerability in Firefox, Firefox ESR, and Thunderbird allows attackers to trick users into granting WebAuthn permissions via manipulated popup n...

May 14, 2024
CVE-2024-52869
6.0

This CVE describes a privilege escalation vulnerability in Teradata Database systems during OS migration from SLES 12 SP2/3 to SLES 15 SP2. User accou...

Jan 8, 2025
CVE-2024-43784
5.7

This vulnerability in lakeFS allows privilege inheritance when reusing usernames. When a deleted user's username is reused for a new account, the new ...

Nov 26, 2024
CVE-2025-26691
5.5

This vulnerability in OpenHarmony allows a local attacker to bypass permission checks and access sensitive information they shouldn't have access to. ...

Jun 8, 2025
CVE-2025-27247
5.5

This vulnerability in OpenHarmony allows a local attacker to bypass permission checks and access sensitive information they shouldn't have access to. ...

Jun 8, 2025
CVE-2025-24087
5.5

This CVE describes a macOS vulnerability where applications could bypass permission checks to access protected user data. It affects macOS systems bef...

Jan 27, 2025
CVE-2024-44188
5.5

This CVE describes a permissions vulnerability in macOS that allows applications to bypass intended restrictions and access protected user data. It af...

Sep 17, 2024
CVE-2024-40859
5.5

This macOS vulnerability allows applications to bypass intended permission restrictions and access sensitive user data. It affects macOS systems befor...

Sep 17, 2024
CVE-2024-40831
5.5

This CVE describes a permissions vulnerability in macOS that allows unauthorized applications to access a user's Photos Library. The issue affects mac...

Sep 17, 2024
CVE-2025-21541
5.4

This vulnerability in Oracle Workflow (part of Oracle E-Business Suite) allows authenticated attackers with low privileges to modify or delete some da...

Jan 21, 2025
CVE-2024-57439
4.9

This vulnerability in RuoYi v4.8.0 allows administrators to cause a Denial of Service (DoS) by duplicating login names during password resets. The att...

Jan 29, 2025
CVE-2024-39902
4.8

This vulnerability in Tuleap's document manager allows users to retain edit or manage permissions on sub-items when permissions are being restricted v...

Jul 22, 2024
CVE-2025-26420
4.4

This vulnerability in Android's permission management system allows attackers to trick users into granting incorrect permissions through permission ov...

Sep 4, 2025
CVE-2025-24791
4.4

The snowflake-connector-nodejs driver has a vulnerability where file permission checks for temporary credential cache can be bypassed. An attacker wit...

Jan 29, 2025
CVE-2023-32199
4.3

CVE-2023-32199 is an improper preservation of permissions vulnerability in Rancher Manager where users retain cluster access after their custom Global...

Oct 29, 2025
CVE-2024-22114
4.3

This CVE describes an information disclosure vulnerability in Zabbix where unauthenticated users can access host statistics through the System Informa...

Aug 12, 2024
CVE-2024-33921
4.3

This CVE describes a broken access control vulnerability in the WordPress ReviewX plugin. It allows unauthorized users to perform actions they shouldn...

May 3, 2024
CVE-2024-36062
4.0

This vulnerability allows any Android application installed on the same device to place phone calls without user interaction by sending a crafted inte...

Nov 7, 2024
CVE-2025-9615
3.3

This CVE describes an improper preservation of permissions vulnerability in NetworkManager where the daemon running with root privileges can access fi...

Jan 26, 2026

About CWE-281 (CWE-281)

Our database tracks 89 CVEs classified as CWE-281, with 14 rated critical and 53 rated high severity. The average CVSS score for CWE-281 vulnerabilities is 7.6.

External reference: View CWE-281 on MITRE CWE →

Monitor CWE-281 Vulnerabilities

Get alerted when new CWE-281 CVEs affect your infrastructure.

Start Monitoring Free