CWE-285: CWE-285
Yearly Trend
Top Affected Vendors
All CWE-285 CVEs (303)
This CVE describes an improper authorization vulnerability in HikCentral Professional where insufficient server-side validation allows attackers to ac...
Mar 2, 2024CVE-2023-38220 is an improper authorization vulnerability in Adobe Commerce (formerly Magento) that allows attackers to bypass security controls and a...
Oct 13, 2023This vulnerability in the Network Observability plugin for OpenShift console allows authentication bypass when Loki authToken configuration is not set...
Sep 15, 2023This vulnerability allows an attacker to cause a denial-of-service (DoS) condition in WLAN hosts by sending malformed Channel Switch Announcement (CSA...
Sep 5, 2023CVE-2022-40521 is an improper authorization vulnerability in Qualcomm modem firmware that allows attackers to cause a transient denial of service (DoS...
Jun 6, 2023This vulnerability allows attackers to cause a denial-of-service (DoS) condition in Qualcomm modems by sending specially crafted OTA (Over-The-Air) me...
Jun 6, 2023This vulnerability allows unauthorized users to access and manipulate sensitive information in Acronis products due to improper authorization checks. ...
May 18, 2023This CVE describes an implicit intent hijacking vulnerability in Samsung Cloud that allows attackers to intercept sensitive information. The vulnerabi...
Jul 12, 2022This vulnerability in Samsung SmartThings allows attackers to remotely access sensitive information through a missing caller check in the JavaScript i...
Jun 7, 2022This vulnerability in Samsung Galaxy Store allows remote attackers to install unauthorized apps by bypassing authorization checks. It affects Samsung ...
Jan 10, 2022CVE-2021-25417 is an improper authorization vulnerability in Samsung's SDP SDK that allows unauthorized access to internal storage. This affects Samsu...
Jun 11, 2021This vulnerability allows unauthenticated access to S3 buckets and keys in Apache Ozone clusters through simple HTTP requests or curl commands. It aff...
Apr 27, 2021CVE-2021-21432 is an authentication bypass vulnerability in Vela CI/CD framework that allows malicious users to access secrets stored in the ~/.netrc ...
Apr 9, 2021This vulnerability in GRUB2 allows privileged attackers to bypass Secure Boot protections by using the cutmem command to remove memory address ranges....
Mar 3, 2021This vulnerability in Harbor allows authenticated users to modify p2p preheat policies in projects they shouldn't have access to. Attackers can exploi...
Nov 14, 2024This CVE describes an incorrect authorization vulnerability in QNAP operating systems that allows authenticated users to bypass intended access restri...
Apr 26, 2024This vulnerability in APICast's 3Scale OIDC module allows attackers to access unauthorized information from separate realms when token mismatches aren...
Sep 27, 2023This vulnerability in Wire-server allows attackers to change user email addresses using only short-lived session tokens, leading to potential account ...
Oct 4, 2021This critical vulnerability in Casdoor allows attackers to bypass authorization checks when creating users via the SCIM endpoint. Attackers can remote...
May 2, 2025This vulnerability allows unauthorized attackers to bypass pairing on Forvia Hella HELLA Driving Recorder DR 820 devices, enabling access to sensitive...
Mar 18, 2025This critical vulnerability in Alien Technology ALR-F800 RFID readers allows remote attackers to execute arbitrary commands via the /var/www/cmd.php e...
Aug 7, 2024This critical vulnerability in Prison Management System 1.0 allows attackers to bypass authorization controls during new user creation. Attackers can ...
Jun 9, 2022This vulnerability allows remote authenticated administrators of any organization within Casdoor to bypass permission verification by manipulating URL...
Oct 8, 2025CVE-2025-24053 is an improper authentication vulnerability in Microsoft Dataverse that allows authenticated attackers to elevate privileges over a net...
Mar 13, 2025This vulnerability allows remote attackers to execute arbitrary code on Microsoft SharePoint Server systems. Attackers could gain control of affected ...
Jan 14, 2025This vulnerability in authentik allows attackers to obtain OAuth tokens with unauthorized scopes when using client_credentials or device_code grants. ...
Nov 21, 2024This vulnerability allows attackers to bypass account approval requirements in SAP Commerce Composable Storefront B2B sites with early login enabled. ...
Jul 9, 2024CVE-2026-25999 is an improper access control vulnerability in Klaw (Apache Kafka management portal) that allows unauthorized users to reset or delete ...
Feb 11, 2026A critical authentication bypass vulnerability in Podman Desktop allows any installed extension to completely circumvent permission checks and gain un...
Jan 28, 2026This vulnerability allows attackers to delete other users' workspaces in OpenCTI by exploiting an authorization flaw in the GraphQL mutation 'Workspac...
Jan 5, 2026An authorization flaw in Rallly's comment deletion API allows any authenticated user to delete comments belonging to other users, including poll owner...
Nov 19, 2025This CVE describes a logic flaw in macOS that could allow malicious applications to access sensitive user data without proper authorization. The vulne...
May 12, 2025This macOS vulnerability allows malicious applications to bypass Privacy preferences by exploiting a downgrade issue in code-signing restrictions. It ...
Jul 29, 2024This vulnerability in Minder allows authenticated users to access, delete, or retrieve artifacts from any repository in the database regardless of own...
Mar 21, 2024An improper authorization vulnerability in Fortinet FortiADC allows low-privileged users to read or backup the full system configuration via HTTP/HTTP...
Dec 13, 2023A cryptographic vulnerability in Qualcomm's HLOS (High-Level Operating System) during key management allows potential unauthorized access to sensitive...
Nov 7, 2023This vulnerability allows authenticated but unprivileged operators in Gallagher Command Centre Server to improperly modify and view Competencies data ...
Jul 25, 2023This vulnerability in NVIDIA vGPU software allows guest operating systems to access and manipulate resources they shouldn't have authorization for. Th...
Jul 4, 2023This CVE allows local authenticated attackers on Juniper Junos OS Evolved systems to execute administrative commands through the 'sysmanctl' shell com...
Apr 17, 2023This vulnerability allows attackers to redirect intents in Samsung's Galaxy Store app, potentially accessing its content provider. This affects Samsun...
Oct 6, 2021An improper configuration vulnerability in Samsung Smart Manager allows attackers to access files with system privileges. This affects Samsung mobile ...
Jun 11, 2021This MongoDB vulnerability allows authenticated users to maintain authorization sessions after their accounts are deleted, potentially gaining access ...
Aug 6, 2019CVE-2023-23696 is an improper authorization vulnerability in Dell Command Intel vPro Out of Band software that allows locally authenticated malicious ...
Feb 7, 2023This vulnerability in SINEC Security Monitor allows authenticated local attackers with low privileges to bypass authorization checks in the file_trans...
Dec 9, 2025An improper authorization flaw in Ansible Automation Controller allows attackers using the Kubernetes API server to send HTTP requests with service ac...
Sep 12, 2024This authorization bypass vulnerability in Revive Adserver allows users with tracker deletion permissions to delete trackers belonging to other accoun...
Jan 20, 2026An authorization flaw in Wekan's card update handling allows authenticated board members to manipulate vote arrays by adding/removing arbitrary user I...
Dec 15, 2025This vulnerability in Langfuse's SSO provider configurations allows account takeover when authenticated users are tricked into visiting a specially cr...
Nov 21, 2025An insecure direct object reference (IDOR) vulnerability in Rallly allows authenticated users to modify other participants' votes in polls without aut...
Nov 19, 2025This vulnerability allows authenticated users of Rallly to impersonate any other user by manipulating the authorName field in comment creation API req...
Nov 19, 2025About CWE-285 (CWE-285)
Our database tracks 303 CVEs classified as CWE-285, with 45 rated critical and 148 rated high severity. The average CVSS score for CWE-285 vulnerabilities is 7.2.
External reference: View CWE-285 on MITRE CWE →
Monitor CWE-285 Vulnerabilities
Get alerted when new CWE-285 CVEs affect your infrastructure.
Start Monitoring Free