CWE-285: CWE-285

303
Total CVEs
45
Critical
148
High
7.2
Avg CVSS

Yearly Trend

2026
25
2025
128
2024
69
2023
38
2022
11

Top Affected Vendors

1 Microsoft 16
2 Adobe 13
3 Apple 11
4 Atlassian 10
5 Rallly 7
6 Samsung 7
7 Cisco 6
8 Redhat 5
9 Fortinet 5
10 Linuxfoundation 4

All CWE-285 CVEs (303)

CVE-2025-65020
6.5

An Insecure Direct Object Reference (IDOR) vulnerability in Rallly's poll duplication endpoint allows authenticated users to duplicate polls they don'...

Nov 19, 2025
CVE-2025-11879
6.5

The GenerateBlocks WordPress plugin has an authorization bypass vulnerability that allows authenticated users with contributor-level access or higher ...

Oct 25, 2025
CVE-2025-11227
6.5

The GiveWP WordPress plugin has an information disclosure vulnerability that allows unauthenticated attackers to access private donation forms and arc...

Oct 4, 2025
CVE-2025-59686
6.5

Kazaar 1.25.12 has an authorization bypass vulnerability where attackers can access order documents by modifying the order-id parameter in API calls. ...

Oct 1, 2025
CVE-2025-55675
6.5

Apache Superset has an improper access control vulnerability where authenticated users can enumerate protected datasources they shouldn't access. By m...

Aug 14, 2025
CVE-2025-54585
6.5

CVE-2025-54585 allows attackers with regular push access to bypass GitProxy's commit approval enforcement when creating new branches. This vulnerabili...

Jul 30, 2025
CVE-2025-6431
6.5

This vulnerability allows attackers to bypass Firefox for Android's external link prompt, potentially exposing users to security vulnerabilities or pr...

Jun 24, 2025
CVE-2024-44314
6.5

CVE-2024-44314 is an incorrect access control vulnerability in TastyIgniter 3.7.6 that allows unauthorized users to remotely update order statuses. Th...

Mar 18, 2025
CVE-2024-38231
6.5

This vulnerability in Windows Remote Desktop Licensing Service allows attackers to cause a denial of service by sending specially crafted packets. It ...

Sep 10, 2024
CVE-2024-3959
6.5

This vulnerability in GitLab allows any user to access private job artifacts, bypassing intended access controls. It affects GitLab Community Edition ...

Jun 27, 2024
CVE-2023-0665
6.5

This vulnerability in HashiCorp Vault's PKI mount allows unauthorized users to delete or modify PKI issuer metadata, potentially causing denial of ser...

Mar 30, 2023
CVE-2022-31667
6.4

This vulnerability in Harbor allows authenticated users to revoke robot account permissions belonging to projects they don't have access to. Attackers...

Nov 14, 2024
CVE-2025-14546
6.3

This CSRF vulnerability in fastapi-sso allows attackers to link their OAuth accounts to victims' internal accounts by exploiting improper state parame...

Dec 19, 2025
CVE-2024-57954
6.2

A permission verification vulnerability in Huawei's media library module allows unauthorized access to protected media content. This affects Huawei de...

Feb 6, 2025
CVE-2024-51525
6.2

This CVE describes a permission control vulnerability in Huawei's clipboard module that could allow unauthorized access to clipboard data. Successful ...

Nov 5, 2024
CVE-2025-53056
6.1

This vulnerability in Oracle JD Edwards EnterpriseOne Tools allows unauthenticated attackers with network access via HTTP to compromise the system. It...

Oct 21, 2025
CVE-2025-50073
6.1

This vulnerability in Oracle WebLogic Server allows unauthenticated attackers with network access via HTTP to compromise the server. It requires human...

Jul 15, 2025
CVE-2025-29778
5.8

Kyverno versions before 1.14.0-alpha.1 ignore subjectRegExp and issuerRegExp validations when verifying artifacts in keyless mode, allowing attackers ...

Mar 24, 2025
CVE-2024-20441
5.7

This vulnerability allows authenticated low-privileged attackers to access sensitive configuration information through a specific REST API endpoint in...

Oct 2, 2024
CVE-2025-0580
5.6

This CVE describes an authorization bypass vulnerability in Shiprocket Module 3 for OpenCart. Attackers can manipulate the contentHash parameter in th...

Jan 20, 2025
CVE-2026-20666
5.5

This CVE describes an authorization vulnerability in macOS where an app could bypass intended restrictions and access sensitive user data. The issue a...

Feb 11, 2026
CVE-2025-43403
5.5

This CVE describes an authorization vulnerability in macOS that allows applications to bypass intended access controls and potentially access sensitiv...

Feb 11, 2026
CVE-2025-46289
5.5

A logic flaw in macOS file handling allows applications to bypass intended access restrictions and read protected user data. This affects macOS system...

Dec 12, 2025
CVE-2025-43231
5.5

This CVE describes a logic flaw in macOS that allows applications to access sensitive user data they shouldn't have permission to access. The vulnerab...

Sep 15, 2025
CVE-2024-40807
5.5

This CVE describes a logic flaw in macOS Shortcuts that allows malicious shortcuts to access sensitive user data without proper user consent prompts. ...

Jul 29, 2024
CVE-2024-40783
5.5

This macOS vulnerability allows malicious applications to bypass Privacy preferences and access restricted data containers. It affects macOS Monterey,...

Jul 29, 2024
CVE-2025-12505
5.4

The weDocs WordPress plugin has an authorization bypass vulnerability that allows authenticated users with Subscriber-level access or higher to modify...

Dec 6, 2025
CVE-2025-12435
5.4

This vulnerability allows attackers to spoof the Chrome Omnibox (address bar) security UI on Android devices, potentially tricking users into believin...

Nov 10, 2025
CVE-2025-62401
5.4

A vulnerability in Moodle's timed assignment feature allows students to bypass time restrictions, potentially gaining extra time to complete assessmen...

Oct 23, 2025
CVE-2025-22169
5.4

Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially exposing sensitive informatio...

Oct 22, 2025
CVE-2025-22175
5.4

Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially viewing or modifying limited ...

Oct 22, 2025
CVE-2024-47165
5.4

This CVE allows attackers to make unauthorized requests to locally deployed Gradio servers from sandboxed iframes or other sources with a null origin....

Oct 10, 2024
CVE-2026-3185
5.3

This CVE describes an authorization bypass vulnerability in the sz-boot-parent framework's API endpoint. Attackers can manipulate the messageId parame...

Feb 25, 2026
CVE-2026-23623
5.3

This vulnerability allows users with view-only access to download files they shouldn't be able to access by using the Ctrl+Shift+S keyboard shortcut. ...

Feb 6, 2026
CVE-2025-14348
5.3

The weMail WordPress plugin has an authorization bypass vulnerability that allows unauthenticated attackers to impersonate administrators by manipulat...

Jan 20, 2026
CVE-2025-12814
5.3

The SiteSEO WordPress plugin has an improper capability check vulnerability that allows authenticated users with any SiteSEO setting permission to res...

Nov 19, 2025
CVE-2025-12777
5.3

The YITH WooCommerce Wishlist plugin for WordPress has an authorization bypass vulnerability that allows unauthenticated attackers to access wishlist ...

Nov 19, 2025
CVE-2025-11174
5.3

The Document Library Lite WordPress plugin has an improper authorization vulnerability that allows unauthenticated attackers to retrieve unpublished d...

Nov 1, 2025
CVE-2025-11256
5.3

The Kognetiks Chatbot plugin for WordPress has a missing capability check vulnerability that allows unauthenticated attackers to upload limited safe f...

Oct 18, 2025
CVE-2025-10947
5.3

This vulnerability allows remote attackers to bypass authorization in Sistemas Pleno Gestão de Locação by manipulating the 'pes_cpf' argument in th...

Sep 25, 2025
CVE-2025-10759
5.3

This CVE describes a CSRF token reuse vulnerability in Webkul QloApps up to version 1.7.0 that allows attackers to bypass authorization by manipulatin...

Sep 21, 2025
CVE-2025-8794
5.3

This vulnerability in LitmusChaos Litmus allows local attackers to bypass authorization by manipulating the projectID argument in the LocalStorage Han...

Aug 10, 2025
CVE-2025-8755
5.3

This vulnerability allows remote attackers to bypass authorization checks in the macrozheng mall e-commerce platform by manipulating the orderId param...

Aug 9, 2025
CVE-2025-53532
5.3

This vulnerability in giscus allows unauthorized users to create GitHub Discussions on any repository where giscus is installed. It affects the server...

Jul 7, 2025
CVE-2024-13821
5.3

The WP Booking Calendar plugin for WordPress has a vulnerability that allows unauthenticated attackers to modify confirmed bookings after they've been...

Feb 12, 2025
CVE-2024-11768
5.3

The Download Manager WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to download password-protected ...

Dec 19, 2024
CVE-2024-38370
5.3

This vulnerability in GLPI allows unauthorized users to download documents via the API without proper authentication. It affects GLPI installations ru...

Nov 15, 2024
CVE-2024-10598
5.3

This critical vulnerability in Tongda OA allows attackers to bypass authorization controls in the annual leave management component, potentially acces...

Oct 31, 2024
CVE-2020-36841
5.3

The WooCommerce Smart Coupons plugin for WordPress has an authorization bypass vulnerability that allows unauthenticated attackers to create gift cert...

Oct 16, 2024
CVE-2024-7799
5.3

CVE-2024-7799 is an improper authorization vulnerability in SourceCodester Simple Online Bidding System 1.0 that allows unauthorized access to admin f...

Aug 15, 2024

About CWE-285 (CWE-285)

Our database tracks 303 CVEs classified as CWE-285, with 45 rated critical and 148 rated high severity. The average CVSS score for CWE-285 vulnerabilities is 7.2.

External reference: View CWE-285 on MITRE CWE →

Monitor CWE-285 Vulnerabilities

Get alerted when new CWE-285 CVEs affect your infrastructure.

Start Monitoring Free