CWE-285: CWE-285

302
Total CVEs
45
Critical
147
High
7.2
Avg CVSS

Yearly Trend

2026
25
2025
128
2024
69
2023
38
2022
11

Top Affected Vendors

1 Microsoft 16
2 Adobe 13
3 Apple 11
4 Atlassian 10
5 Rallly 7
6 Samsung 7
7 Cisco 6
8 Redhat 5
9 Fortinet 5
10 Linuxfoundation 4

All CWE-285 CVEs (302)

CVE-2025-62610
8.1

Hono's JWT Auth Middleware lacks built-in audience (aud) claim verification, allowing valid tokens issued for different services to be accepted when m...

Oct 22, 2025
CVE-2025-22239
8.1

This vulnerability allows authorized Salt minions to inject arbitrary events onto the Salt Master's event bus. This can disrupt master operations, tri...

Jun 13, 2025
CVE-2025-26683
8.1

CVE-2025-26683 is an improper authorization vulnerability in Azure Playwright that allows unauthorized attackers to elevate privileges over a network....

Mar 31, 2025
CVE-2025-24418
8.1

CVE-2025-24418 is an improper authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security controls and escal...

Feb 11, 2025
CVE-2024-13646
8.1

The Single-user-chat WordPress plugin has an authorization bypass vulnerability that allows authenticated users with subscriber-level access or higher...

Jan 30, 2025
CVE-2024-47183
8.1

Parse Server versions before 6.5.9 and 7.3.0 with allowCustomObjectId enabled are vulnerable to privilege escalation. An attacker who can create new u...

Oct 4, 2024
CVE-2024-7624
8.1

The Zephyr Project Manager WordPress plugin has a privilege escalation vulnerability that allows authenticated users with subscriber-level access or h...

Aug 15, 2024
CVE-2024-37282
8.1

This vulnerability allows API keys with specific privileges to create new API keys with elevated privileges, leading to privilege escalation. It affec...

Jun 28, 2024
CVE-2024-2441
8.1

The VikBooking WordPress plugin before version 1.6.8 contains an authorization bypass vulnerability that allows authenticated users with subscriber-le...

May 14, 2024
CVE-2023-2950
8.1

CVE-2023-2950 is an improper authorization vulnerability in OpenEMR that allows authenticated users to access administrative functions without proper ...

May 28, 2023
CVE-2020-25716
8.1

CVE-2020-25716 is a privilege escalation vulnerability in CloudForms where users with specific group permissions can perform administrator-only action...

Jun 7, 2021
CVE-2021-22863
8.1

This vulnerability allows authenticated GitHub Enterprise Server users to modify pull request maintainer permissions without authorization, potentiall...

Mar 3, 2021
CVE-2026-20960
8.0

This vulnerability in Microsoft Power Apps allows authenticated attackers to execute arbitrary code remotely due to improper authorization checks. It ...

Jan 16, 2026
CVE-2025-21400
8.0

CVE-2025-21400 is a remote code execution vulnerability in Microsoft SharePoint Server that allows an authenticated attacker to execute arbitrary code...

Feb 11, 2025
CVE-2023-20186
8.0

This vulnerability allows authenticated remote attackers with level 15 privileges to bypass AAA command authorization checks when using SCP, enabling ...

Sep 27, 2023
CVE-2025-26430
7.8

This vulnerability in Android's Settings app allows malicious apps to access files from other user profiles without permission. It enables local privi...

Sep 4, 2025
CVE-2025-21275
7.8

This vulnerability in Windows App Package Installer allows attackers to elevate privileges on affected systems. An authenticated attacker could exploi...

Jan 14, 2025
CVE-2024-23667
7.8

CVE-2024-23667 is an improper authorization vulnerability in Fortinet FortiWebManager that allows attackers to execute unauthorized code or commands v...

Jun 3, 2024
CVE-2024-23670
7.8

CVE-2024-23670 is an improper authorization vulnerability in Fortinet FortiWebManager that allows attackers to execute unauthorized code or commands v...

Jun 3, 2024
CVE-2024-0077
7.8

This vulnerability in NVIDIA's Virtual GPU Manager allows guest operating systems to allocate unauthorized resources, potentially leading to code exec...

Mar 27, 2024
CVE-2023-26466
7.8

This vulnerability allows non-admin users to modify client configuration files to change the server URL, potentially redirecting communications to mal...

Apr 10, 2023
CVE-2022-3787
7.8

CVE-2022-3787 is a local privilege escalation vulnerability in device-mapper-multipath where attackers can bypass access controls by writing to UNIX d...

Mar 29, 2023
CVE-2023-21433
7.8

This vulnerability allows local attackers to bypass Galaxy Store's access controls and install applications without proper authorization. It affects S...

Feb 9, 2023
CVE-2022-4062
7.8

This CVE-2022-4062 vulnerability allows attackers with access to the localhost interface of EcoStruxure Power Commission to bypass authorization contr...

Feb 1, 2023
CVE-2021-44204
7.8

This vulnerability allows local attackers to escalate privileges on Windows systems by exploiting improper access control checks on named pipes. Attac...

Feb 4, 2022
CVE-2025-53944
7.7

AutoGPT versions 0.6.15 and below have an authorization bypass vulnerability in the external API's get_graph_execution_results endpoint. Authenticated...

Jul 30, 2025
CVE-2025-6713
7.7

This vulnerability allows unauthorized users to bypass MongoDB's authorization controls by exploiting a flaw in the $mergeCursors aggregation pipeline...

Jul 7, 2025
CVE-2022-31670
7.7

This vulnerability allows authenticated Harbor users to modify tag retention policies in projects they shouldn't have access to. Attackers can exploit...

Nov 14, 2024
CVE-2023-36826
7.7

This vulnerability allows authenticated Sentry users to download debug or artifact bundles from any organization or project without proper authorizati...

Jul 25, 2023
CVE-2022-3683
7.7

CVE-2022-3683 is an authorization bypass vulnerability in the SDM600 API web services that allows attackers to access sensitive data from insufficient...

Mar 28, 2023
CVE-2021-21362
7.7

MinIO versions before RELEASE.2021-03-04T00-53-13Z contain a policy bypass vulnerability where users with read-only permissions can create temporary u...

Mar 8, 2021
CVE-2024-43706
7.6

This CVE describes an improper authorization vulnerability in Kibana's Synthetic monitor endpoint that allows authenticated users to perform unauthori...

Jun 10, 2025
CVE-2023-6538
7.6

This vulnerability allows authenticated users with Storage, Server, or combined Server+Storage administrative roles in Hitachi Vantara NAS products to...

Dec 11, 2023
CVE-2023-5808
7.6

This vulnerability allows authenticated users with Storage administrative roles in SMU to access HNAS configuration backup and diagnostic data through...

Dec 5, 2023
CVE-2023-22428
7.6

This vulnerability allows authenticated operators in Gallagher Command Centre Server to improperly modify Division lineage due to insufficient privile...

Jul 24, 2023
CVE-2023-2534
7.6

An improper authorization vulnerability in OTRS 8's Websocket API backend allows authenticated agents to track user behavior and gain live system insi...

May 8, 2023
CVE-2026-25885
7.5

CVE-2026-25885 is an authentication bypass vulnerability in PolarLearn's WebSocket group chat functionality. Unauthenticated attackers can subscribe t...

Feb 9, 2026
CVE-2025-54868
7.5

LibreChat versions 0.0.6 through 0.7.7-rc1 have an exposed testing endpoint (/api/search/test) that allows unauthorized access to read arbitrary user ...

Aug 5, 2025
CVE-2025-32982
7.5

NETSCOUT nGeniusONE before version 6.4.0 b2350 has a broken authorization schema in the report module that allows unauthorized access to sensitive rep...

Apr 25, 2025
CVE-2025-1361
7.5

The IP2Location Country Blocker WordPress plugin exposes sensitive configuration settings to unauthenticated users due to missing capability checks. T...

Feb 22, 2025
CVE-2024-13694
7.5

This vulnerability allows unauthenticated attackers to access wishlist data they shouldn't have permission to view via an insecure direct object refer...

Jan 30, 2025
CVE-2025-23042
7.5

This vulnerability allows attackers to bypass Gradio's file access controls by changing the letter case of blocked file paths on case-insensitive file...

Jan 14, 2025
CVE-2024-51479
7.5

This CVE describes an authorization bypass vulnerability in Next.js middleware. Attackers can bypass pathname-based authorization checks for pages dir...

Dec 17, 2024
CVE-2024-36467
7.5

This vulnerability allows authenticated users with API access to escalate their privileges by adding themselves to any group, including administrative...

Nov 27, 2024
CVE-2024-42490
7.5

This vulnerability in authentik allows unauthenticated users to access sensitive API endpoints if they know specific object UUIDs. It affects authenti...

Aug 22, 2024
CVE-2024-41670
7.5

This vulnerability in the PayPal Official module for PrestaShop allows malicious customers to confirm orders even when PayPal payments are declined. A...

Jul 26, 2024
CVE-2024-3840
7.5

This vulnerability allows a remote attacker to bypass Chrome's Site Isolation security boundaries by crafting a malicious HTML page. Attackers could p...

Apr 17, 2024
CVE-2023-52359
7.5

This vulnerability allows attackers to bypass permission verification in ActivityTaskManagerService APIs, potentially disrupting system services. It a...

Apr 8, 2024
CVE-2024-29033
7.5

This vulnerability in OAuthenticator's GoogleOAuthenticator.hosted_domain feature allows unauthorized access to JupyterHub instances. Instead of restr...

Mar 20, 2024
CVE-2024-25063
7.5

This CVE describes an improper authorization vulnerability in HikCentral Professional where insufficient server-side validation allows attackers to ac...

Mar 2, 2024

About CWE-285 (CWE-285)

Our database tracks 302 CVEs classified as CWE-285, with 45 rated critical and 147 rated high severity. The average CVSS score for CWE-285 vulnerabilities is 7.2.

External reference: View CWE-285 on MITRE CWE →

Monitor CWE-285 Vulnerabilities

Get alerted when new CWE-285 CVEs affect your infrastructure.

Start Monitoring Free