CWE-285: CWE-285
Yearly Trend
Top Affected Vendors
All CWE-285 CVEs (303)
An Insecure Direct Object Reference (IDOR) vulnerability in Rallly's poll duplication endpoint allows authenticated users to duplicate polls they don'...
Nov 19, 2025The GenerateBlocks WordPress plugin has an authorization bypass vulnerability that allows authenticated users with contributor-level access or higher ...
Oct 25, 2025The GiveWP WordPress plugin has an information disclosure vulnerability that allows unauthenticated attackers to access private donation forms and arc...
Oct 4, 2025Kazaar 1.25.12 has an authorization bypass vulnerability where attackers can access order documents by modifying the order-id parameter in API calls. ...
Oct 1, 2025Apache Superset has an improper access control vulnerability where authenticated users can enumerate protected datasources they shouldn't access. By m...
Aug 14, 2025CVE-2025-54585 allows attackers with regular push access to bypass GitProxy's commit approval enforcement when creating new branches. This vulnerabili...
Jul 30, 2025This vulnerability allows attackers to bypass Firefox for Android's external link prompt, potentially exposing users to security vulnerabilities or pr...
Jun 24, 2025CVE-2024-44314 is an incorrect access control vulnerability in TastyIgniter 3.7.6 that allows unauthorized users to remotely update order statuses. Th...
Mar 18, 2025This vulnerability in Windows Remote Desktop Licensing Service allows attackers to cause a denial of service by sending specially crafted packets. It ...
Sep 10, 2024This vulnerability in GitLab allows any user to access private job artifacts, bypassing intended access controls. It affects GitLab Community Edition ...
Jun 27, 2024This vulnerability in HashiCorp Vault's PKI mount allows unauthorized users to delete or modify PKI issuer metadata, potentially causing denial of ser...
Mar 30, 2023This vulnerability in Harbor allows authenticated users to revoke robot account permissions belonging to projects they don't have access to. Attackers...
Nov 14, 2024This CSRF vulnerability in fastapi-sso allows attackers to link their OAuth accounts to victims' internal accounts by exploiting improper state parame...
Dec 19, 2025A permission verification vulnerability in Huawei's media library module allows unauthorized access to protected media content. This affects Huawei de...
Feb 6, 2025This CVE describes a permission control vulnerability in Huawei's clipboard module that could allow unauthorized access to clipboard data. Successful ...
Nov 5, 2024This vulnerability in Oracle JD Edwards EnterpriseOne Tools allows unauthenticated attackers with network access via HTTP to compromise the system. It...
Oct 21, 2025This vulnerability in Oracle WebLogic Server allows unauthenticated attackers with network access via HTTP to compromise the server. It requires human...
Jul 15, 2025Kyverno versions before 1.14.0-alpha.1 ignore subjectRegExp and issuerRegExp validations when verifying artifacts in keyless mode, allowing attackers ...
Mar 24, 2025This vulnerability allows authenticated low-privileged attackers to access sensitive configuration information through a specific REST API endpoint in...
Oct 2, 2024This CVE describes an authorization bypass vulnerability in Shiprocket Module 3 for OpenCart. Attackers can manipulate the contentHash parameter in th...
Jan 20, 2025This CVE describes an authorization vulnerability in macOS where an app could bypass intended restrictions and access sensitive user data. The issue a...
Feb 11, 2026This CVE describes an authorization vulnerability in macOS that allows applications to bypass intended access controls and potentially access sensitiv...
Feb 11, 2026A logic flaw in macOS file handling allows applications to bypass intended access restrictions and read protected user data. This affects macOS system...
Dec 12, 2025This CVE describes a logic flaw in macOS that allows applications to access sensitive user data they shouldn't have permission to access. The vulnerab...
Sep 15, 2025This CVE describes a logic flaw in macOS Shortcuts that allows malicious shortcuts to access sensitive user data without proper user consent prompts. ...
Jul 29, 2024This macOS vulnerability allows malicious applications to bypass Privacy preferences and access restricted data containers. It affects macOS Monterey,...
Jul 29, 2024The weDocs WordPress plugin has an authorization bypass vulnerability that allows authenticated users with Subscriber-level access or higher to modify...
Dec 6, 2025This vulnerability allows attackers to spoof the Chrome Omnibox (address bar) security UI on Android devices, potentially tricking users into believin...
Nov 10, 2025A vulnerability in Moodle's timed assignment feature allows students to bypass time restrictions, potentially gaining extra time to complete assessmen...
Oct 23, 2025Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially exposing sensitive informatio...
Oct 22, 2025Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially viewing or modifying limited ...
Oct 22, 2025This CVE allows attackers to make unauthorized requests to locally deployed Gradio servers from sandboxed iframes or other sources with a null origin....
Oct 10, 2024This CVE describes an authorization bypass vulnerability in the sz-boot-parent framework's API endpoint. Attackers can manipulate the messageId parame...
Feb 25, 2026This vulnerability allows users with view-only access to download files they shouldn't be able to access by using the Ctrl+Shift+S keyboard shortcut. ...
Feb 6, 2026The weMail WordPress plugin has an authorization bypass vulnerability that allows unauthenticated attackers to impersonate administrators by manipulat...
Jan 20, 2026The SiteSEO WordPress plugin has an improper capability check vulnerability that allows authenticated users with any SiteSEO setting permission to res...
Nov 19, 2025The YITH WooCommerce Wishlist plugin for WordPress has an authorization bypass vulnerability that allows unauthenticated attackers to access wishlist ...
Nov 19, 2025The Document Library Lite WordPress plugin has an improper authorization vulnerability that allows unauthenticated attackers to retrieve unpublished d...
Nov 1, 2025The Kognetiks Chatbot plugin for WordPress has a missing capability check vulnerability that allows unauthenticated attackers to upload limited safe f...
Oct 18, 2025This vulnerability allows remote attackers to bypass authorization in Sistemas Pleno Gestão de Locação by manipulating the 'pes_cpf' argument in th...
Sep 25, 2025This CVE describes a CSRF token reuse vulnerability in Webkul QloApps up to version 1.7.0 that allows attackers to bypass authorization by manipulatin...
Sep 21, 2025This vulnerability in LitmusChaos Litmus allows local attackers to bypass authorization by manipulating the projectID argument in the LocalStorage Han...
Aug 10, 2025This vulnerability allows remote attackers to bypass authorization checks in the macrozheng mall e-commerce platform by manipulating the orderId param...
Aug 9, 2025This vulnerability in giscus allows unauthorized users to create GitHub Discussions on any repository where giscus is installed. It affects the server...
Jul 7, 2025The WP Booking Calendar plugin for WordPress has a vulnerability that allows unauthenticated attackers to modify confirmed bookings after they've been...
Feb 12, 2025The Download Manager WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to download password-protected ...
Dec 19, 2024This vulnerability in GLPI allows unauthorized users to download documents via the API without proper authentication. It affects GLPI installations ru...
Nov 15, 2024This critical vulnerability in Tongda OA allows attackers to bypass authorization controls in the annual leave management component, potentially acces...
Oct 31, 2024The WooCommerce Smart Coupons plugin for WordPress has an authorization bypass vulnerability that allows unauthenticated attackers to create gift cert...
Oct 16, 2024CVE-2024-7799 is an improper authorization vulnerability in SourceCodester Simple Online Bidding System 1.0 that allows unauthorized access to admin f...
Aug 15, 2024About CWE-285 (CWE-285)
Our database tracks 303 CVEs classified as CWE-285, with 45 rated critical and 148 rated high severity. The average CVSS score for CWE-285 vulnerabilities is 7.2.
External reference: View CWE-285 on MITRE CWE →
Monitor CWE-285 Vulnerabilities
Get alerted when new CWE-285 CVEs affect your infrastructure.
Start Monitoring Free