CWE-285: CWE-285
Yearly Trend
Top Affected Vendors
All CWE-285 CVEs (301)
This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in File Browser versions before 2.45.1. Any authenticated user with share ...
Nov 12, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to reset passwords for any user account, including admi...
Nov 7, 2025This vulnerability allows any authenticated Juju controller user to upload malicious agent binaries to any model or the controller itself, bypassing p...
Jul 8, 2025Graylog users can create API tokens for any user, including administrators, by exploiting weak permission checks in the REST API. This allows privileg...
Jul 2, 2025The Offsprout Page Builder WordPress plugin contains an authorization vulnerability that allows authenticated users with Contributor-level access or h...
May 31, 2025The WP-GeoMeta WordPress plugin versions 0.3.4 to 0.3.5 contain a privilege escalation vulnerability where authenticated users with Subscriber-level a...
May 31, 2025OpenFGA versions 1.8.0 through 1.8.12 contain an authorization bypass vulnerability in Check and ListObject API calls. Attackers can bypass intended p...
May 22, 2025A bug in XWiki's required rights enforcement allows users with edit rights to set programming rights as required rights on documents. If a user with p...
May 21, 2025The Frontend Dashboard WordPress plugin versions 1.0 to 2.2.7 contain a privilege escalation vulnerability due to missing capability checks in the aja...
May 13, 2025tgstation-server versions before 6.12.3 have an authorization bypass vulnerability where role permissions were incorrectly combined using OR logic ins...
Jan 6, 2025The Mapster WP Maps WordPress plugin has an insufficient capability check vulnerability that allows authenticated attackers with contributor-level acc...
Oct 25, 2024Sakai Collaboration and Learning Environment versions 23.0 through 23.2 contain an authorization bypass vulnerability where users created with 'rolevi...
Oct 15, 2024Apache ActiveMQ Artemis versions before 2.29.0 expose the Log4J2 MBean through the authenticated Jolokia endpoint, allowing authenticated non-administ...
Oct 14, 2024This vulnerability in Cisco Small Business VPN routers allows authenticated remote attackers to escalate privileges from guest to admin by exploiting ...
Oct 2, 2024This vulnerability allows authenticated remote attackers to bypass authorization checks in the JSON-RPC API of affected Cisco products, enabling unaut...
Sep 11, 2024This vulnerability in Bareos allows users to bypass command access controls by using command abbreviations. When negative ACLs are configured to forbi...
Sep 10, 2024SudoBot Discord moderation bot versions before 9.26.7 contain a privilege escalation vulnerability in the -config command that allows any user to modi...
Sep 3, 2024This vulnerability allows attackers to upload arbitrary firmware to Milesight UR32L routers through the luci2-io file-import functionality. Attackers ...
May 1, 2024This vulnerability in IBM OpenPages with Watson allows authenticated users to bypass authorization checks by accessing non-public APIs. Attackers can ...
Jan 19, 2024Dell NetWorker 19.7 has an improper authorization vulnerability in its client component. An unauthenticated attacker on the same network can manipulat...
Sep 27, 2023This vulnerability allows a user with Technician profile in GLPI to generate a personal token for a Super-Admin account, enabling privilege escalation...
Apr 5, 2023DIAEnergie versions before v1.9.03.001 contain an improper authorization vulnerability that allows unauthorized users to bypass authentication and acc...
Feb 17, 2023This vulnerability allows authenticated remote users with limited privileges (like Monitoring role) to bypass authorization controls in PowerPath Mana...
Feb 11, 2023CVE-2022-30670 is an improper authorization vulnerability in Adobe RoboHelp Server that allows authenticated attackers to escalate privileges to full ...
Jun 16, 2022CVE-2021-43939 is an improper authorization vulnerability in Elcomplus SmartPTT where low-privileged authenticated users can bypass authorization cont...
Apr 28, 2022This vulnerability allows an attacker with access to the Inforail Service in Ivanti Avalanche to escalate privileges, potentially gaining administrati...
Dec 7, 2021This vulnerability allows authenticated users in the ShinHer StudyOnline System to bypass authorization controls and access/modify other users' creden...
Oct 15, 2021This vulnerability in Nextcloud Server allows application-specific authentication tokens to escalate their own permissions. Tokens configured with no ...
Jul 12, 2021This vulnerability allows authenticated remote attackers to elevate privileges to Administrator in Cisco Business Process Automation (BPA) web managem...
Jul 8, 2021This vulnerability allows authenticated remote attackers to elevate privileges to Administrator in Cisco Business Process Automation (BPA) web managem...
Jul 8, 2021This vulnerability allows low-privileged users in WordPress to install and activate arbitrary plugins from the official repository via an AJAX endpoin...
May 14, 2021This vulnerability allows low-privileged users in WordPress to install and activate arbitrary plugins from the official repository via an AJAX endpoin...
May 14, 2021This vulnerability allows low-privileged WordPress users (like subscribers or contributors) to install and activate arbitrary plugins from the officia...
May 14, 2021This vulnerability allows low-privileged WordPress users (subscriber/contributor level) to install and activate arbitrary plugins from the WordPress r...
May 14, 2021CVE-2025-46840 is an improper authorization vulnerability in Adobe Experience Manager that allows low-privileged attackers to bypass security controls...
Jun 10, 2025An improper authorization vulnerability in Azure Bot Framework SDK allows unauthorized attackers to elevate privileges over a network. This affects or...
Apr 30, 2025An improper authorization vulnerability in Samsung Members app's 'samsungrewards' deeplink scheme allows remote attackers to access user data associat...
Apr 9, 2021This critical vulnerability in KylinSoft kylin-activation on KylinOS allows local attackers to bypass authorization controls through file import funct...
Mar 3, 2023This CVE allows malicious websites to bypass CORS origin validation in Gradio servers when cookies are present, enabling unauthorized requests to loca...
Oct 10, 2024Apache Solr deployments using RuleBasedAuthorizationPlugin with specific configurations are vulnerable to unauthorized API access. Attackers can bypas...
Jan 21, 2026Adobe Commerce has an improper authorization vulnerability that allows attackers to bypass security measures and gain unauthorized access. This affect...
Jun 10, 2025The PeproDev Ultimate Profile Solutions WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to modify us...
May 7, 2025This CVE describes an Improper Authorization vulnerability in Adobe Commerce that allows attackers to bypass security measures without user interactio...
Jun 13, 2024The OptinMonster WordPress plugin vulnerability allows attackers to bypass authorization checks and access sensitive information or modify plugin sett...
Nov 1, 2021OpenEMR patient portal users can forge provider signatures by exploiting an authorization bypass in the signature upload endpoint. This affects all Op...
Feb 25, 2026In OneUptime version 9.0.5598, low-permission users can bypass the intended user interface and create new accounts directly through API requests. This...
Nov 26, 2025This CVE describes an authorization flaw in Rallly's poll management feature where any authenticated user can pause or resume any poll by using only t...
Nov 19, 2025This CVE describes an insecure direct object reference (IDOR) vulnerability in Rallly, an open-source scheduling tool. Any authenticated user can dele...
Nov 19, 2025The Astra Security Suite WordPress plugin has an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files t...
Nov 11, 2025Hono's JWT Auth Middleware lacks built-in audience (aud) claim verification, allowing valid tokens issued for different services to be accepted when m...
Oct 22, 2025About CWE-285 (CWE-285)
Our database tracks 301 CVEs classified as CWE-285, with 44 rated critical and 147 rated high severity. The average CVSS score for CWE-285 vulnerabilities is 7.2.
External reference: View CWE-285 on MITRE CWE →
Monitor CWE-285 Vulnerabilities
Get alerted when new CWE-285 CVEs affect your infrastructure.
Start Monitoring Free