CWE-285: CWE-285
Yearly Trend
Top Affected Vendors
All CWE-285 CVEs (301)
CVE-2025-65041 is an improper authorization vulnerability in Microsoft Partner Center that allows unauthorized attackers to elevate privileges over a ...
Dec 18, 2025CVE-2023-33189 is an authorization bypass vulnerability in Pomerium identity-aware access proxy. Attackers can craft requests to bypass authorization ...
May 30, 2023This critical vulnerability affects Cambium Networks wireless devices, allowing attackers to bypass authentication on multiple API routes. Unauthorize...
Feb 18, 2022CVE-2021-37705 is an authorization bypass vulnerability in OneFuzz that allows authenticated users from any Azure AD tenant to make authorized API cal...
Aug 13, 2021CVE-2021-28799 is an improper authorization vulnerability in QNAP's HBS 3 backup software that allows remote attackers to bypass authentication and lo...
May 13, 2021CVE-2025-49746 is an improper authorization vulnerability in Azure Machine Learning that allows authenticated attackers to escalate privileges over th...
Jul 18, 2025This critical Azure vulnerability allows authenticated attackers to escalate privileges within cloud environments, potentially gaining administrative ...
Apr 30, 2025This vulnerability allows unauthorized Command Centre Operators to modify command line macros in Gallagher Command Centre Server, potentially executin...
Jun 11, 2021An authentication bypass vulnerability in FUXA web-based SCADA/HMI software allows unauthenticated remote attackers to gain administrative access via ...
Feb 9, 2026This vulnerability in PlaciPy version 1.0.0 allows attackers to execute code evaluation outside of intended assessment windows due to missing lifecycl...
Feb 9, 2026This vulnerability allows a Power User in Terminalfour to bypass authorization checks and escalate privileges for other accounts. By intercepting and ...
Dec 2, 2025This CVE describes an authorization bypass vulnerability in Apple operating systems that allows malicious apps to access sensitive user data without p...
Sep 15, 2025The Icons Factory WordPress plugin contains an arbitrary file deletion vulnerability that allows unauthenticated attackers to delete any file on the s...
Aug 15, 2025The Frontend Dashboard WordPress plugin versions 1.0 to 2.2.6 contain a privilege escalation vulnerability that allows unauthenticated attackers to re...
May 7, 2025The Job Listings WordPress plugin versions 0.1 to 0.1.1 contain a privilege escalation vulnerability that allows unauthenticated attackers to register...
May 3, 2025CVE-2025-30392 is an improper authorization vulnerability in Azure Bot Framework SDK that allows unauthorized attackers to elevate privileges over a n...
Apr 30, 2025This vulnerability allows any user to exploit the WikiManager REST API in XWiki Platform to create a new wiki and gain administrator privileges. This ...
Mar 19, 2025OpenFGA versions before 1.8.5 contain an authorization bypass vulnerability that allows unauthorized access when specific Check and ListObject API cal...
Feb 19, 2025OpenFGA versions 1.3.8 to 1.8.2 contain an authorization bypass vulnerability when using conditions with contextual tuples and caching enabled. Attack...
Jan 13, 2025CVE-2024-36108 is an authorization bypass vulnerability in casgate identity management system that allows unauthenticated attackers to access sensitiv...
May 31, 2024This vulnerability allows unauthenticated attackers to execute arbitrary commands on TOTOLINK EX1800T routers by exploiting the apcliEncrypType parame...
May 8, 2024Danswer AI Assistant versions before 3.63 have an authorization flaw allowing unauthorized access to Slack bot tokens. Attackers with network access c...
Apr 26, 2024CVE-2022-3748 is an authentication bypass vulnerability in ForgeRock Access Management that allows attackers to gain unauthorized access without valid...
Apr 14, 2023CVE-2022-3229 is an authentication bypass vulnerability in Unified Remote's web management interface that allows unauthenticated attackers to disable ...
Feb 6, 2023CVE-2022-24083 is a critical authentication bypass vulnerability in Pega Platform that allows attackers to circumvent local password checks, potential...
Jul 25, 2022CVE-2021-42338 is an authentication bypass vulnerability in 4MOSAn GCB Doctor's login page that allows unauthenticated attackers to inject malicious c...
Nov 19, 2021CVE-2021-3044 is an improper authorization vulnerability in Palo Alto Networks Cortex XSOAR that allows remote unauthenticated attackers with network ...
Jun 22, 2021This vulnerability allows Deno modules imported dynamically via import() or new Worker to bypass network and file system permission checks when static...
May 28, 2021This vulnerability allows editors with limited permissions in Grav CMS to modify form processing logic by manipulating YAML frontmatter in POST reques...
Dec 1, 2025This vulnerability in kcp allows attackers to create or delete objects in any arbitrary target workspace via the APIExport VirtualWorkspace, bypassing...
Mar 20, 2025This vulnerability in Lenovo Smart Camera models X3, X5, and C2E allows unauthorized users to access device information, modify firmware, and change d...
Aug 17, 2021This critical vulnerability in Azure Entra ID (formerly Azure Active Directory) allows attackers to elevate privileges within cloud environments. Atta...
Jan 22, 2026This critical vulnerability in LibreChat allows authenticated users to execute arbitrary shell commands as root within the container via a single API ...
Jan 12, 2026An Insecure Direct Object Reference (IDOR) vulnerability in Rallly allows any authenticated user to finalize polls they don't own by manipulating the ...
Nov 19, 2025This is an elevation of privilege vulnerability in Azure Portal that allows authenticated users to gain unauthorized administrative access. It affects...
Aug 7, 2025This CVE describes an authorization bypass vulnerability in Next.js middleware. Attackers can bypass authorization checks by sending requests with the...
Mar 21, 2025This CVE describes an Improper Authorization vulnerability in Drupal Open Social that allows attackers to collect data from common resource locations ...
Jan 9, 2025DedeCMS V5.7.114 contains an improper authorization vulnerability in mail_file_manage.php that allows attackers to delete any file on the server. This...
May 6, 2024CVE-2023-2227 is an improper authorization vulnerability in Modoboa email management software that allows authenticated users to access administrative...
Apr 21, 2023CVE-2022-38375 is an improper authorization vulnerability in Fortinet FortiNAC that allows unauthenticated attackers to perform administrative operati...
Feb 16, 2023This vulnerability in Arista EOS allows local users with 'nopassword' configuration to gain unrestricted access to network devices due to incorrect AA...
Jan 14, 2022CVE-2021-28506 is an authentication bypass vulnerability in Arista EOS gNOI APIs that allows unauthorized factory resets of network devices. This affe...
Jan 14, 2022CVE-2021-41974 is an authentication bypass vulnerability in Tad Book3 that allows remote attackers to view and modify arbitrary book content without p...
Oct 8, 2021This vulnerability in Misskey allows third-party applications to access endpoints or Websocket APIs without proper user permission due to incorrect 'k...
Dec 29, 2023This vulnerability in the IDonate WordPress plugin allows authenticated attackers with Subscriber-level access or higher to escalate privileges to adm...
Feb 19, 2026This vulnerability allows authenticated users of AutoGPT to execute arbitrary code on the backend server by bypassing disabled block restrictions. Att...
Feb 12, 2026This vulnerability in RustFS allows a principal with export-only IAM permissions to perform import operations, leading to unauthorized creation or mod...
Jan 8, 2026This vulnerability allows any authenticated low-privileged user in Primakon Pi Portal to impersonate any other user, including administrators, by expl...
Nov 25, 2025OpenFGA versions 1.4.0 to 1.11.0 have an improper policy enforcement vulnerability in Check and ListObject calls. This allows attackers to bypass auth...
Nov 21, 2025This vulnerability allows unauthorized attackers to elevate privileges in Dynamics OmniChannel SDK Storage Containers through improper authorization c...
Nov 20, 2025About CWE-285 (CWE-285)
Our database tracks 301 CVEs classified as CWE-285, with 44 rated critical and 147 rated high severity. The average CVSS score for CWE-285 vulnerabilities is 7.2.
External reference: View CWE-285 on MITRE CWE →
Monitor CWE-285 Vulnerabilities
Get alerted when new CWE-285 CVEs affect your infrastructure.
Start Monitoring Free