CWE-285: CWE-285

301
Total CVEs
44
Critical
147
High
7.2
Avg CVSS

Yearly Trend

2026
25
2025
128
2024
69
2023
38
2022
11

Top Affected Vendors

1 Microsoft 16
2 Adobe 13
3 Apple 11
4 Atlassian 10
5 Rallly 7
6 Samsung 7
7 Cisco 6
8 Redhat 5
9 Fortinet 5
10 Linuxfoundation 4

All CWE-285 CVEs (301)

CVE-2025-64523
8.8

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in File Browser versions before 2.45.1. Any authenticated user with share ...

Nov 12, 2025
CVE-2025-4519
8.8

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to reset passwords for any user account, including admi...

Nov 7, 2025
CVE-2025-0928
8.8

This vulnerability allows any authenticated Juju controller user to upload malicious agent binaries to any model or the controller itself, bypassing p...

Jul 8, 2025
CVE-2025-53106
8.8

Graylog users can create API tokens for any user, including administrators, by exploiting weak permission checks in the REST API. This allows privileg...

Jul 2, 2025
CVE-2025-4672
8.8

The Offsprout Page Builder WordPress plugin contains an authorization vulnerability that allows authenticated users with Contributor-level access or h...

May 31, 2025
CVE-2025-4103
8.8

The WP-GeoMeta WordPress plugin versions 0.3.4 to 0.3.5 contain a privilege escalation vulnerability where authenticated users with Subscriber-level a...

May 31, 2025
CVE-2025-48371
8.8

OpenFGA versions 1.8.0 through 1.8.12 contain an authorization bypass vulnerability in Check and ListObject API calls. Attackers can bypass intended p...

May 22, 2025
CVE-2025-48063
8.8

A bug in XWiki's required rights enforcement allows users with edit rights to set programming rights as required rights on documents. If a user with p...

May 21, 2025
CVE-2025-4473
8.8

The Frontend Dashboard WordPress plugin versions 1.0 to 2.2.7 contain a privilege escalation vulnerability due to missing capability checks in the aja...

May 13, 2025
CVE-2025-21611
8.8

tgstation-server versions before 6.12.3 have an authorization bypass vulnerability where role permissions were incorrectly combined using OR logic ins...

Jan 6, 2025
CVE-2024-9235
8.8

The Mapster WP Maps WordPress plugin has an insufficient capability check vulnerability that allows authenticated attackers with contributor-level acc...

Oct 25, 2024
CVE-2024-47876
8.8

Sakai Collaboration and Learning Environment versions 23.0 through 23.2 contain an authorization bypass vulnerability where users created with 'rolevi...

Oct 15, 2024
CVE-2023-50780
8.8

Apache ActiveMQ Artemis versions before 2.29.0 expose the Log4J2 MBean through the authenticated Jolokia endpoint, allowing authenticated non-administ...

Oct 14, 2024
CVE-2024-20393
8.8

This vulnerability in Cisco Small Business VPN routers allows authenticated remote attackers to escalate privileges from guest to admin by exploiting ...

Oct 2, 2024
CVE-2024-20381
8.8

This vulnerability allows authenticated remote attackers to bypass authorization checks in the JSON-RPC API of affected Cisco products, enabling unaut...

Sep 11, 2024
CVE-2024-45044
8.8

This vulnerability in Bareos allows users to bypass command access controls by using command abbreviations. When negative ACLs are configured to forbi...

Sep 10, 2024
CVE-2024-45307
8.8

SudoBot Discord moderation bot versions before 9.26.7 contain a privilege escalation vulnerability in the -config command that allows any user to modi...

Sep 3, 2024
CVE-2023-47166
8.8

This vulnerability allows attackers to upload arbitrary firmware to Milesight UR32L routers through the luci2-io file-import functionality. Attackers ...

May 1, 2024
CVE-2023-40683
8.8

This vulnerability in IBM OpenPages with Watson allows authenticated users to bypass authorization checks by accessing non-public APIs. Attackers can ...

Jan 19, 2024
CVE-2023-28055
8.8

Dell NetWorker 19.7 has an improper authorization vulnerability in its client component. An unauthenticated attacker on the same network can manipulat...

Sep 27, 2023
CVE-2023-28634
8.8

This vulnerability allows a user with Technician profile in GLPI to generate a personal token for a Super-Admin account, enabling privilege escalation...

Apr 5, 2023
CVE-2023-0822
8.8

DIAEnergie versions before v1.9.03.001 contain an improper authorization vulnerability that allows unauthorized users to bypass authentication and acc...

Feb 17, 2023
CVE-2022-34446
8.8

This vulnerability allows authenticated remote users with limited privileges (like Monitoring role) to bypass authorization controls in PowerPath Mana...

Feb 11, 2023
CVE-2022-30670
8.8

CVE-2022-30670 is an improper authorization vulnerability in Adobe RoboHelp Server that allows authenticated attackers to escalate privileges to full ...

Jun 16, 2022
CVE-2021-43939
8.8

CVE-2021-43939 is an improper authorization vulnerability in Elcomplus SmartPTT where low-privileged authenticated users can bypass authorization cont...

Apr 28, 2022
CVE-2021-42126
8.8

This vulnerability allows an attacker with access to the Inforail Service in Ivanti Avalanche to escalate privileges, potentially gaining administrati...

Dec 7, 2021
CVE-2021-42330
8.8

This vulnerability allows authenticated users in the ShinHer StudyOnline System to bypass authorization controls and access/modify other users' creden...

Oct 15, 2021
CVE-2021-32688
8.8

This vulnerability in Nextcloud Server allows application-specific authentication tokens to escalate their own permissions. Tokens configured with no ...

Jul 12, 2021
CVE-2021-1576
8.8

This vulnerability allows authenticated remote attackers to elevate privileges to Administrator in Cisco Business Process Automation (BPA) web managem...

Jul 8, 2021
CVE-2021-1574
8.8

This vulnerability allows authenticated remote attackers to elevate privileges to Administrator in Cisco Business Process Automation (BPA) web managem...

Jul 8, 2021
CVE-2021-24193
8.8

This vulnerability allows low-privileged users in WordPress to install and activate arbitrary plugins from the official repository via an AJAX endpoin...

May 14, 2021
CVE-2021-24195
8.8

This vulnerability allows low-privileged users in WordPress to install and activate arbitrary plugins from the official repository via an AJAX endpoin...

May 14, 2021
CVE-2021-24189
8.8

This vulnerability allows low-privileged WordPress users (like subscribers or contributors) to install and activate arbitrary plugins from the officia...

May 14, 2021
CVE-2021-24191
8.8

This vulnerability allows low-privileged WordPress users (subscriber/contributor level) to install and activate arbitrary plugins from the WordPress r...

May 14, 2021
CVE-2025-46840
8.7

CVE-2025-46840 is an improper authorization vulnerability in Adobe Experience Manager that allows low-privileged attackers to bypass security controls...

Jun 10, 2025
CVE-2025-30389
8.7

An improper authorization vulnerability in Azure Bot Framework SDK allows unauthorized attackers to elevate privileges over a network. This affects or...

Apr 30, 2025
CVE-2021-25374
8.6

An improper authorization vulnerability in Samsung Members app's 'samsungrewards' deeplink scheme allows remote attackers to access user data associat...

Apr 9, 2021
CVE-2023-1164
8.4

This critical vulnerability in KylinSoft kylin-activation on KylinOS allows local attackers to bypass authorization controls through file import funct...

Mar 3, 2023
CVE-2024-47084
8.3

This CVE allows malicious websites to bypass CORS origin validation in Gradio servers when cookies are present, enabling unauthorized requests to loca...

Oct 10, 2024
CVE-2026-22022
8.2

Apache Solr deployments using RuleBasedAuthorizationPlugin with specific configurations are vulnerable to unauthorized API access. Attackers can bypas...

Jan 21, 2026
CVE-2025-43585
8.2

Adobe Commerce has an improper authorization vulnerability that allows attackers to bypass security measures and gain unauthorized access. This affect...

Jun 10, 2025
CVE-2025-3921
8.2

The PeproDev Ultimate Profile Solutions WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to modify us...

May 7, 2025
CVE-2024-34104
8.2

This CVE describes an Improper Authorization vulnerability in Adobe Commerce that allows attackers to bypass security measures without user interactio...

Jun 13, 2024
CVE-2021-39341
8.2

The OptinMonster WordPress plugin vulnerability allows attackers to bypass authorization checks and access sensitive information or modify plugin sett...

Nov 1, 2021
CVE-2026-24890
8.1

OpenEMR patient portal users can forge provider signatures by exploiting an authorization bypass in the signature upload endpoint. This affects all Op...

Feb 25, 2026
CVE-2025-65966
8.1

In OneUptime version 9.0.5598, low-permission users can bypass the intended user interface and create new accounts directly through API requests. This...

Nov 26, 2025
CVE-2025-65033
8.1

This CVE describes an authorization flaw in Rallly's poll management feature where any authenticated user can pause or resume any poll by using only t...

Nov 19, 2025
CVE-2025-65029
8.1

This CVE describes an insecure direct object reference (IDOR) vulnerability in Rallly, an open-source scheduling tool. Any authenticated user can dele...

Nov 19, 2025
CVE-2025-11521
8.1

The Astra Security Suite WordPress plugin has an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files t...

Nov 11, 2025
CVE-2025-62610
8.1

Hono's JWT Auth Middleware lacks built-in audience (aud) claim verification, allowing valid tokens issued for different services to be accepted when m...

Oct 22, 2025

About CWE-285 (CWE-285)

Our database tracks 301 CVEs classified as CWE-285, with 44 rated critical and 147 rated high severity. The average CVSS score for CWE-285 vulnerabilities is 7.2.

External reference: View CWE-285 on MITRE CWE →

Monitor CWE-285 Vulnerabilities

Get alerted when new CWE-285 CVEs affect your infrastructure.

Start Monitoring Free