CWE-285: CWE-285
Yearly Trend
Top Affected Vendors
All CWE-285 CVEs (302)
Hono's JWT Auth Middleware lacks built-in audience (aud) claim verification, allowing valid tokens issued for different services to be accepted when m...
Oct 22, 2025This vulnerability allows authorized Salt minions to inject arbitrary events onto the Salt Master's event bus. This can disrupt master operations, tri...
Jun 13, 2025CVE-2025-26683 is an improper authorization vulnerability in Azure Playwright that allows unauthorized attackers to elevate privileges over a network....
Mar 31, 2025CVE-2025-24418 is an improper authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security controls and escal...
Feb 11, 2025The Single-user-chat WordPress plugin has an authorization bypass vulnerability that allows authenticated users with subscriber-level access or higher...
Jan 30, 2025Parse Server versions before 6.5.9 and 7.3.0 with allowCustomObjectId enabled are vulnerable to privilege escalation. An attacker who can create new u...
Oct 4, 2024The Zephyr Project Manager WordPress plugin has a privilege escalation vulnerability that allows authenticated users with subscriber-level access or h...
Aug 15, 2024This vulnerability allows API keys with specific privileges to create new API keys with elevated privileges, leading to privilege escalation. It affec...
Jun 28, 2024The VikBooking WordPress plugin before version 1.6.8 contains an authorization bypass vulnerability that allows authenticated users with subscriber-le...
May 14, 2024CVE-2023-2950 is an improper authorization vulnerability in OpenEMR that allows authenticated users to access administrative functions without proper ...
May 28, 2023CVE-2020-25716 is a privilege escalation vulnerability in CloudForms where users with specific group permissions can perform administrator-only action...
Jun 7, 2021This vulnerability allows authenticated GitHub Enterprise Server users to modify pull request maintainer permissions without authorization, potentiall...
Mar 3, 2021This vulnerability in Microsoft Power Apps allows authenticated attackers to execute arbitrary code remotely due to improper authorization checks. It ...
Jan 16, 2026CVE-2025-21400 is a remote code execution vulnerability in Microsoft SharePoint Server that allows an authenticated attacker to execute arbitrary code...
Feb 11, 2025This vulnerability allows authenticated remote attackers with level 15 privileges to bypass AAA command authorization checks when using SCP, enabling ...
Sep 27, 2023This vulnerability in Android's Settings app allows malicious apps to access files from other user profiles without permission. It enables local privi...
Sep 4, 2025This vulnerability in Windows App Package Installer allows attackers to elevate privileges on affected systems. An authenticated attacker could exploi...
Jan 14, 2025CVE-2024-23667 is an improper authorization vulnerability in Fortinet FortiWebManager that allows attackers to execute unauthorized code or commands v...
Jun 3, 2024CVE-2024-23670 is an improper authorization vulnerability in Fortinet FortiWebManager that allows attackers to execute unauthorized code or commands v...
Jun 3, 2024This vulnerability in NVIDIA's Virtual GPU Manager allows guest operating systems to allocate unauthorized resources, potentially leading to code exec...
Mar 27, 2024This vulnerability allows non-admin users to modify client configuration files to change the server URL, potentially redirecting communications to mal...
Apr 10, 2023CVE-2022-3787 is a local privilege escalation vulnerability in device-mapper-multipath where attackers can bypass access controls by writing to UNIX d...
Mar 29, 2023This vulnerability allows local attackers to bypass Galaxy Store's access controls and install applications without proper authorization. It affects S...
Feb 9, 2023This CVE-2022-4062 vulnerability allows attackers with access to the localhost interface of EcoStruxure Power Commission to bypass authorization contr...
Feb 1, 2023This vulnerability allows local attackers to escalate privileges on Windows systems by exploiting improper access control checks on named pipes. Attac...
Feb 4, 2022AutoGPT versions 0.6.15 and below have an authorization bypass vulnerability in the external API's get_graph_execution_results endpoint. Authenticated...
Jul 30, 2025This vulnerability allows unauthorized users to bypass MongoDB's authorization controls by exploiting a flaw in the $mergeCursors aggregation pipeline...
Jul 7, 2025This vulnerability allows authenticated Harbor users to modify tag retention policies in projects they shouldn't have access to. Attackers can exploit...
Nov 14, 2024This vulnerability allows authenticated Sentry users to download debug or artifact bundles from any organization or project without proper authorizati...
Jul 25, 2023CVE-2022-3683 is an authorization bypass vulnerability in the SDM600 API web services that allows attackers to access sensitive data from insufficient...
Mar 28, 2023MinIO versions before RELEASE.2021-03-04T00-53-13Z contain a policy bypass vulnerability where users with read-only permissions can create temporary u...
Mar 8, 2021This CVE describes an improper authorization vulnerability in Kibana's Synthetic monitor endpoint that allows authenticated users to perform unauthori...
Jun 10, 2025This vulnerability allows authenticated users with Storage, Server, or combined Server+Storage administrative roles in Hitachi Vantara NAS products to...
Dec 11, 2023This vulnerability allows authenticated users with Storage administrative roles in SMU to access HNAS configuration backup and diagnostic data through...
Dec 5, 2023This vulnerability allows authenticated operators in Gallagher Command Centre Server to improperly modify Division lineage due to insufficient privile...
Jul 24, 2023An improper authorization vulnerability in OTRS 8's Websocket API backend allows authenticated agents to track user behavior and gain live system insi...
May 8, 2023CVE-2026-25885 is an authentication bypass vulnerability in PolarLearn's WebSocket group chat functionality. Unauthenticated attackers can subscribe t...
Feb 9, 2026LibreChat versions 0.0.6 through 0.7.7-rc1 have an exposed testing endpoint (/api/search/test) that allows unauthorized access to read arbitrary user ...
Aug 5, 2025NETSCOUT nGeniusONE before version 6.4.0 b2350 has a broken authorization schema in the report module that allows unauthorized access to sensitive rep...
Apr 25, 2025The IP2Location Country Blocker WordPress plugin exposes sensitive configuration settings to unauthenticated users due to missing capability checks. T...
Feb 22, 2025This vulnerability allows unauthenticated attackers to access wishlist data they shouldn't have permission to view via an insecure direct object refer...
Jan 30, 2025This vulnerability allows attackers to bypass Gradio's file access controls by changing the letter case of blocked file paths on case-insensitive file...
Jan 14, 2025This CVE describes an authorization bypass vulnerability in Next.js middleware. Attackers can bypass pathname-based authorization checks for pages dir...
Dec 17, 2024This vulnerability allows authenticated users with API access to escalate their privileges by adding themselves to any group, including administrative...
Nov 27, 2024This vulnerability in authentik allows unauthenticated users to access sensitive API endpoints if they know specific object UUIDs. It affects authenti...
Aug 22, 2024This vulnerability in the PayPal Official module for PrestaShop allows malicious customers to confirm orders even when PayPal payments are declined. A...
Jul 26, 2024This vulnerability allows a remote attacker to bypass Chrome's Site Isolation security boundaries by crafting a malicious HTML page. Attackers could p...
Apr 17, 2024This vulnerability allows attackers to bypass permission verification in ActivityTaskManagerService APIs, potentially disrupting system services. It a...
Apr 8, 2024This vulnerability in OAuthenticator's GoogleOAuthenticator.hosted_domain feature allows unauthorized access to JupyterHub instances. Instead of restr...
Mar 20, 2024This CVE describes an improper authorization vulnerability in HikCentral Professional where insufficient server-side validation allows attackers to ac...
Mar 2, 2024About CWE-285 (CWE-285)
Our database tracks 302 CVEs classified as CWE-285, with 45 rated critical and 147 rated high severity. The average CVSS score for CWE-285 vulnerabilities is 7.2.
External reference: View CWE-285 on MITRE CWE →
Monitor CWE-285 Vulnerabilities
Get alerted when new CWE-285 CVEs affect your infrastructure.
Start Monitoring Free