CWE-285: CWE-285
Yearly Trend
Top Affected Vendors
All CWE-285 CVEs (303)
This vulnerability in Evmos allows users to delegate tokens that haven't vested yet, specifically affecting employees and grantees with funds in Clawb...
Jun 6, 2024This vulnerability in Grafana's datasource proxy API allows users with minimal permissions to bypass authorization checks by adding an extra slash cha...
Jun 2, 2025This vulnerability in MySQL Server's InnoDB component allows high-privileged attackers with network access to cause a denial of service by crashing or...
Jul 16, 2024This vulnerability in MySQL Server's InnoDB component allows high-privileged attackers with network access to cause a denial of service by crashing or...
Jul 16, 2024CVE-2022-3686 is a denial-of-service vulnerability in Hitachi Energy SDM600 endpoints where an attacker can render the application unresponsive by sen...
Mar 28, 2023An authorization vulnerability in iOS and iPadOS allows attackers with physical access to a locked device to view sensitive user information. This aff...
Feb 11, 2026Bostr versions before 3.0.10 have an authentication bypass vulnerability when the noscraper setting is enabled. This allows unauthorized users to acce...
Aug 1, 2024The UiPress Lite WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to modify ...
Nov 21, 2025The SiteSEO WordPress plugin up to version 1.3.2 has an authorization flaw that allows authenticated users with siteseo_manage capability to read sens...
Nov 19, 2025The Image Gallery plugin for WordPress has a vulnerability that allows authenticated attackers with author-level permissions or higher to delete arbit...
Nov 15, 2025The SiteSEO WordPress plugin up to version 1.3.1 has a missing authorization vulnerability that allows authenticated attackers with Author-level acces...
Nov 1, 2025This vulnerability allows attackers to bypass authorization controls in Bdtask Pharmacy Management System by manipulating the user profile handler. At...
Oct 27, 2025CVE-2025-12283 is an authorization bypass vulnerability in code-projects Client Details System 1.0 that allows attackers to access restricted function...
Oct 27, 2025This vulnerability allows authenticated WordPress users with contributor-level permissions or higher to modify sensitive plugin options without proper...
Oct 25, 2025The Originality.ai AI Checker WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or high...
Oct 24, 2025Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially viewing sensitive information...
Oct 22, 2025Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially viewing sensitive information...
Oct 22, 2025Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially viewing sensitive information...
Oct 22, 2025Jira Align has an authorization bypass vulnerability where low-privilege users can perform actions they shouldn't by including a state-related paramet...
Oct 22, 2025Jira Align has an authorization vulnerability where low-privilege users can modify other users' private checklists. This allows unauthorized data mani...
Oct 22, 2025Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially exposing sensitive informatio...
Oct 22, 2025Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially viewing sensitive sprint data...
Oct 22, 2025Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially viewing sensitive information...
Oct 22, 2025An authenticated attacker can access static files from other VDOMs (Virtual Domains) in affected Fortinet products by sending specially crafted HTTP/H...
Oct 14, 2025This vulnerability allows attackers to bypass authorization checks in the cancelOrder function of macrozheng mall. By manipulating the orderId paramet...
Sep 2, 2025This vulnerability allows remote attackers to bypass authorization in the macrozheng mall e-commerce platform by manipulating the orderId parameter in...
Sep 2, 2025This vulnerability allows authenticated WordPress users with GiveWP Worker-level access or higher to modify donation payment statuses without proper a...
Aug 21, 2025This vulnerability allows attackers to bypass authorization mechanisms in Portabilis i-Educar's API endpoint at /module/Api/Diario. Attackers can remo...
Aug 10, 2025The HT Mega plugin for WordPress has an information disclosure vulnerability that allows authenticated users with Author-level permissions or higher t...
Jul 31, 2025This vulnerability allows attackers to bypass authorization controls in the Summer Pearl Group Vacation Rental Management Platform, potentially access...
May 26, 2025An improper API access control vulnerability in Umbraco CMS allows authenticated users with low privileges to create and update data type information,...
Mar 11, 2025The SupportCandy WordPress plugin has an insecure direct object reference vulnerability that allows authenticated users to download support ticket att...
Mar 7, 2025This vulnerability allows unauthorized access to the salary slip functionality in SourceCodester Best Employee Management System 1.0. Attackers can by...
Feb 24, 2025CVE-2025-24784 is a privilege escalation vulnerability in kubewarden-controller where non-admin users can create AdmissionPolicyGroup resources that d...
Jan 30, 2025This CVE describes an improper authorization vulnerability in Moodle where users can edit or delete RSS feeds they shouldn't have permission to modify...
Nov 18, 2024This CVE describes an improper authorization vulnerability in Moodle where users can access report schedules without proper edit permissions. This aff...
Nov 18, 2024This CVE describes an improper authorization vulnerability in Dolibarr ERP/CRM software where users with restricted permissions in the Reception secti...
Nov 15, 2024This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to send unauthorized deactivation requests for arbitrar...
Oct 24, 2024This CVE describes an access control vulnerability in Huawei's SystemUI module that could allow unauthorized access to system services. Successful exp...
Sep 4, 2024CVE-2024-39419 is an improper authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security measures and modif...
Aug 14, 2024CVE-2024-39415 is an improper authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security measures and acces...
Aug 14, 2024CVE-2024-39417 is an improper authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security measures and acces...
Aug 14, 2024CVE-2024-39411 is an improper authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security measures and acces...
Aug 14, 2024Adobe Commerce has an improper authorization vulnerability that allows low-privileged attackers to bypass security features and access minor informati...
Aug 14, 2024Adobe Commerce has an improper authorization vulnerability that allows low-privileged attackers to bypass security features and modify minor informati...
Aug 14, 2024CVE-2024-39407 is an improper authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security measures and modif...
Aug 14, 2024This vulnerability is an Insecure Direct Object Reference (IDOR) in Campcodes Online Laundry Management System 1.0 that allows unauthorized access to ...
May 14, 2024This vulnerability in newbee-mall-plus allows attackers to bypass authorization by manipulating the userid parameter in the executeSeckill function. I...
Nov 7, 2025A logic vulnerability in Apple's iOS, iPadOS, Safari, and macOS allows malicious applications to access a user's Safari browsing history without prope...
Feb 11, 2026This CVE describes an authorization bypass vulnerability in the fushengqian fuint software's authentication token handler. Attackers can potentially b...
Nov 3, 2025About CWE-285 (CWE-285)
Our database tracks 303 CVEs classified as CWE-285, with 45 rated critical and 148 rated high severity. The average CVSS score for CWE-285 vulnerabilities is 7.2.
External reference: View CWE-285 on MITRE CWE →
Monitor CWE-285 Vulnerabilities
Get alerted when new CWE-285 CVEs affect your infrastructure.
Start Monitoring Free