CWE-285: CWE-285

303
Total CVEs
45
Critical
148
High
7.2
Avg CVSS

Yearly Trend

2026
25
2025
128
2024
69
2023
38
2022
11

Top Affected Vendors

1 Microsoft 16
2 Adobe 13
3 Apple 11
4 Atlassian 10
5 Rallly 7
6 Samsung 7
7 Cisco 6
8 Redhat 5
9 Fortinet 5
10 Linuxfoundation 4

All CWE-285 CVEs (303)

CVE-2024-25063
7.5

This CVE describes an improper authorization vulnerability in HikCentral Professional where insufficient server-side validation allows attackers to ac...

Mar 2, 2024
CVE-2023-38220
7.5

CVE-2023-38220 is an improper authorization vulnerability in Adobe Commerce (formerly Magento) that allows attackers to bypass security controls and a...

Oct 13, 2023
CVE-2023-0813
7.5

This vulnerability in the Network Observability plugin for OpenShift console allows authentication bypass when Loki authToken configuration is not set...

Sep 15, 2023
CVE-2023-33019
7.5

This vulnerability allows an attacker to cause a denial-of-service (DoS) condition in WLAN hosts by sending malformed Channel Switch Announcement (CSA...

Sep 5, 2023
CVE-2022-40521
7.5

CVE-2022-40521 is an improper authorization vulnerability in Qualcomm modem firmware that allows attackers to cause a transient denial of service (DoS...

Jun 6, 2023
CVE-2022-40536
7.5

This vulnerability allows attackers to cause a denial-of-service (DoS) condition in Qualcomm modems by sending specially crafted OTA (Over-The-Air) me...

Jun 6, 2023
CVE-2022-45450
7.5

This vulnerability allows unauthorized users to access and manipulate sensitive information in Acronis products due to improper authorization checks. ...

May 18, 2023
CVE-2022-33713
7.5

This CVE describes an implicit intent hijacking vulnerability in Samsung Cloud that allows attackers to intercept sensitive information. The vulnerabi...

Jul 12, 2022
CVE-2022-30746
7.5

This vulnerability in Samsung SmartThings allows attackers to remotely access sensitive information through a missing caller check in the JavaScript i...

Jun 7, 2022
CVE-2022-22288
7.5

This vulnerability in Samsung Galaxy Store allows remote attackers to install unauthorized apps by bypassing authorization checks. It affects Samsung ...

Jan 10, 2022
CVE-2021-25417
7.5

CVE-2021-25417 is an improper authorization vulnerability in Samsung's SDP SDK that allows unauthorized access to internal storage. This affects Samsu...

Jun 11, 2021
CVE-2020-17517
7.5

This vulnerability allows unauthenticated access to S3 buckets and keys in Apache Ozone clusters through simple HTTP requests or curl commands. It aff...

Apr 27, 2021
CVE-2021-21432
7.5

CVE-2021-21432 is an authentication bypass vulnerability in Vela CI/CD framework that allows malicious users to access secrets stored in the ~/.netrc ...

Apr 9, 2021
CVE-2020-27779
7.5

This vulnerability in GRUB2 allows privileged attackers to bypass Secure Boot protections by using the cutmem command to remove memory address ranges....

Mar 3, 2021
CVE-2022-31668
7.4

This vulnerability in Harbor allows authenticated users to modify p2p preheat policies in projects they shouldn't have access to. Attackers can exploi...

Nov 14, 2024
CVE-2023-50363
7.4

This CVE describes an incorrect authorization vulnerability in QNAP operating systems that allows authenticated users to bypass intended access restri...

Apr 26, 2024
CVE-2023-0456
7.4

This vulnerability in APICast's 3Scale OIDC module allows attackers to access unauthorized information from separate realms when token mismatches aren...

Sep 27, 2023
CVE-2021-41100
7.4

This vulnerability in Wire-server allows attackers to change user email addresses using only short-lived session tokens, leading to potential account ...

Oct 4, 2021
CVE-2025-4210
7.3

This critical vulnerability in Casdoor allows attackers to bypass authorization checks when creating users via the SCIM endpoint. Attackers can remote...

May 2, 2025
CVE-2025-30117
7.3

This vulnerability allows unauthorized attackers to bypass pairing on Forvia Hella HELLA Driving Recorder DR 820 devices, enabling access to sensitive...

Mar 18, 2025
CVE-2024-7578
7.3

This critical vulnerability in Alien Technology ALR-F800 RFID readers allows remote attackers to execute arbitrary commands via the /var/www/cmd.php e...

Aug 7, 2024
CVE-2022-2019
7.3

This critical vulnerability in Prison Management System 1.0 allows attackers to bypass authorization controls during new user creation. Attackers can ...

Jun 9, 2022
CVE-2025-61524
7.2

This vulnerability allows remote authenticated administrators of any organization within Casdoor to bypass permission verification by manipulating URL...

Oct 8, 2025
CVE-2025-24053
7.2

CVE-2025-24053 is an improper authentication vulnerability in Microsoft Dataverse that allows authenticated attackers to elevate privileges over a net...

Mar 13, 2025
CVE-2025-21348
7.2

This vulnerability allows remote attackers to execute arbitrary code on Microsoft SharePoint Server systems. Attackers could gain control of affected ...

Jan 14, 2025
CVE-2024-52287
7.2

This vulnerability in authentik allows attackers to obtain OAuth tokens with unauthorized scopes when using client_credentials or device_code grants. ...

Nov 21, 2024
CVE-2024-39597
7.2

This vulnerability allows attackers to bypass account approval requirements in SAP Commerce Composable Storefront B2B sites with early login enabled. ...

Jul 9, 2024
CVE-2026-25999
7.1

CVE-2026-25999 is an improper access control vulnerability in Klaw (Apache Kafka management portal) that allows unauthorized users to reset or delete ...

Feb 11, 2026
CVE-2026-24835
7.1

A critical authentication bypass vulnerability in Podman Desktop allows any installed extension to completely circumvent permission checks and gain un...

Jan 28, 2026
CVE-2025-61781
7.1

This vulnerability allows attackers to delete other users' workspaces in OpenCTI by exploiting an authorization flaw in the GraphQL mutation 'Workspac...

Jan 5, 2026
CVE-2025-65030
7.1

An authorization flaw in Rallly's comment deletion API allows any authenticated user to delete comments belonging to other users, including poll owner...

Nov 19, 2025
CVE-2025-31249
7.1

This CVE describes a logic flaw in macOS that could allow malicious applications to access sensitive user data without proper authorization. The vulne...

May 12, 2025
CVE-2024-40814
7.1

This macOS vulnerability allows malicious applications to bypass Privacy preferences by exploiting a downgrade issue in code-signing restrictions. It ...

Jul 29, 2024
CVE-2024-27916
7.1

This vulnerability in Minder allows authenticated users to access, delete, or retrieve artifacts from any repository in the database regardless of own...

Mar 21, 2024
CVE-2023-41673
7.1

An improper authorization vulnerability in Fortinet FortiADC allows low-privileged users to read or backup the full system configuration via HTTP/HTTP...

Dec 13, 2023
CVE-2023-28556
7.1

A cryptographic vulnerability in Qualcomm's HLOS (High-Level Operating System) during key management allows potential unauthorized access to sensitive...

Nov 7, 2023
CVE-2023-25074
7.1

This vulnerability allows authenticated but unprivileged operators in Gallagher Command Centre Server to improperly modify and view Competencies data ...

Jul 25, 2023
CVE-2023-25517
7.1

This vulnerability in NVIDIA vGPU software allows guest operating systems to access and manipulate resources they shouldn't have authorization for. Th...

Jul 4, 2023
CVE-2023-28973
7.1

This CVE allows local authenticated attackers on Juniper Junos OS Evolved systems to execute administrative commands through the 'sysmanctl' shell com...

Apr 17, 2023
CVE-2021-25499
7.1

This vulnerability allows attackers to redirect intents in Samsung's Galaxy Store app, potentially accessing its content provider. This affects Samsun...

Oct 6, 2021
CVE-2021-25399
7.1

An improper configuration vulnerability in Samsung Smart Manager allows attackers to access files with system privileges. This affects Samsung mobile ...

Jun 11, 2021
CVE-2019-2386
7.1

This MongoDB vulnerability allows authenticated users to maintain authorization sessions after their accounts are deleted, potentially gaining access ...

Aug 6, 2019
CVE-2023-23696
7.0

CVE-2023-23696 is an improper authorization vulnerability in Dell Command Intel vPro Out of Band software that allows locally authenticated malicious ...

Feb 7, 2023
CVE-2025-40830
6.7

This vulnerability in SINEC Security Monitor allows authenticated local attackers with low privileges to bypass authorization checks in the file_trans...

Dec 9, 2025
CVE-2024-6840
6.6

An improper authorization flaw in Ansible Automation Controller allows attackers using the Kubernetes API server to send HTTP requests with service ac...

Sep 12, 2024
CVE-2026-21641
6.5

This authorization bypass vulnerability in Revive Adserver allows users with tracker deletion permissions to delete trackers belonging to other accoun...

Jan 20, 2026
CVE-2025-65782
6.5

An authorization flaw in Wekan's card update handling allows authenticated board members to manipulate vote arrays by adding/removing arbitrary user I...

Dec 15, 2025
CVE-2025-65107
6.5

This vulnerability in Langfuse's SSO provider configurations allows account takeover when authenticated users are tricked into visiting a specially cr...

Nov 21, 2025
CVE-2025-65028
6.5

An insecure direct object reference (IDOR) vulnerability in Rallly allows authenticated users to modify other participants' votes in polls without aut...

Nov 19, 2025
CVE-2025-65031
6.5

This vulnerability allows authenticated users of Rallly to impersonate any other user by manipulating the authorName field in comment creation API req...

Nov 19, 2025

About CWE-285 (CWE-285)

Our database tracks 303 CVEs classified as CWE-285, with 45 rated critical and 148 rated high severity. The average CVSS score for CWE-285 vulnerabilities is 7.2.

External reference: View CWE-285 on MITRE CWE →

Monitor CWE-285 Vulnerabilities

Get alerted when new CWE-285 CVEs affect your infrastructure.

Start Monitoring Free