CWE-285: CWE-285

303
Total CVEs
45
Critical
148
High
7.2
Avg CVSS

Yearly Trend

2026
25
2025
128
2024
69
2023
38
2022
11

Top Affected Vendors

1 Microsoft 16
2 Adobe 13
3 Apple 11
4 Atlassian 10
5 Rallly 7
6 Samsung 7
7 Cisco 6
8 Redhat 5
9 Fortinet 5
10 Linuxfoundation 4

All CWE-285 CVEs (303)

CVE-2024-37154
5.3

This vulnerability in Evmos allows users to delegate tokens that haven't vested yet, specifically affecting employees and grantees with funds in Clawb...

Jun 6, 2024
CVE-2025-3454
5.0

This vulnerability in Grafana's datasource proxy API allows users with minimal permissions to bypass authorization checks by adding an extra slash cha...

Jun 2, 2025
CVE-2024-21179
4.9

This vulnerability in MySQL Server's InnoDB component allows high-privileged attackers with network access to cause a denial of service by crashing or...

Jul 16, 2024
CVE-2024-21159
4.9

This vulnerability in MySQL Server's InnoDB component allows high-privileged attackers with network access to cause a denial of service by crashing or...

Jul 16, 2024
CVE-2022-3686
4.8

CVE-2022-3686 is a denial-of-service vulnerability in Hitachi Energy SDM600 endpoints where an attacker can render the application unresponsive by sen...

Mar 28, 2023
CVE-2026-20661
4.6

An authorization vulnerability in iOS and iPadOS allows attackers with physical access to a locked device to view sensitive user information. This aff...

Feb 11, 2026
CVE-2024-41962
4.6

Bostr versions before 3.0.10 have an authentication bypass vulnerability when the noscraper setting is enabled. This allows unauthorized users to acce...

Aug 1, 2024
CVE-2025-11815
4.3

The UiPress Lite WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to modify ...

Nov 21, 2025
CVE-2025-13085
4.3

The SiteSEO WordPress plugin up to version 1.3.2 has an authorization flaw that allows authenticated users with siteseo_manage capability to read sens...

Nov 19, 2025
CVE-2025-12494
4.3

The Image Gallery plugin for WordPress has a vulnerability that allows authenticated attackers with author-level permissions or higher to delete arbit...

Nov 15, 2025
CVE-2025-12367
4.3

The SiteSEO WordPress plugin up to version 1.3.1 has a missing authorization vulnerability that allows authenticated attackers with Author-level acces...

Nov 1, 2025
CVE-2025-12288
4.3

This vulnerability allows attackers to bypass authorization controls in Bdtask Pharmacy Management System by manipulating the user profile handler. At...

Oct 27, 2025
CVE-2025-12283
4.3

CVE-2025-12283 is an authorization bypass vulnerability in code-projects Client Details System 1.0 that allows attackers to access restricted function...

Oct 27, 2025
CVE-2025-12005
4.3

This vulnerability allows authenticated WordPress users with contributor-level permissions or higher to modify sensitive plugin options without proper...

Oct 25, 2025
CVE-2025-10902
4.3

The Originality.ai AI Checker WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or high...

Oct 24, 2025
CVE-2025-22176
4.3

Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially viewing sensitive information...

Oct 22, 2025
CVE-2025-22177
4.3

Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially viewing sensitive information...

Oct 22, 2025
CVE-2025-22168
4.3

Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially viewing sensitive information...

Oct 22, 2025
CVE-2025-22170
4.3

Jira Align has an authorization bypass vulnerability where low-privilege users can perform actions they shouldn't by including a state-related paramet...

Oct 22, 2025
CVE-2025-22171
4.3

Jira Align has an authorization vulnerability where low-privilege users can modify other users' private checklists. This allows unauthorized data mani...

Oct 22, 2025
CVE-2025-22172
4.3

Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially exposing sensitive informatio...

Oct 22, 2025
CVE-2025-22173
4.3

Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially viewing sensitive sprint data...

Oct 22, 2025
CVE-2025-22174
4.3

Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially viewing sensitive information...

Oct 22, 2025
CVE-2025-54822
4.3

An authenticated attacker can access static files from other VDOMs (Virtual Domains) in affected Fortinet products by sending specially crafted HTTP/H...

Oct 14, 2025
CVE-2025-9835
4.3

This vulnerability allows attackers to bypass authorization checks in the cancelOrder function of macrozheng mall. By manipulating the orderId paramet...

Sep 2, 2025
CVE-2025-9836
4.3

This vulnerability allows remote attackers to bypass authorization in the macrozheng mall e-commerce platform by manipulating the orderId parameter in...

Sep 2, 2025
CVE-2025-7221
4.3

This vulnerability allows authenticated WordPress users with GiveWP Worker-level access or higher to modify donation payment statuses without proper a...

Aug 21, 2025
CVE-2025-8789
4.3

This vulnerability allows attackers to bypass authorization mechanisms in Portabilis i-Educar's API endpoint at /module/Api/Diario. Attackers can remo...

Aug 10, 2025
CVE-2025-8401
4.3

The HT Mega plugin for WordPress has an information disclosure vulnerability that allows authenticated users with Author-level permissions or higher t...

Jul 31, 2025
CVE-2025-5182
4.3

This vulnerability allows attackers to bypass authorization controls in the Summer Pearl Group Vacation Rental Management Platform, potentially access...

May 26, 2025
CVE-2025-27601
4.3

An improper API access control vulnerability in Umbraco CMS allows authenticated users with low privileges to create and update data type information,...

Mar 11, 2025
CVE-2024-13552
4.3

The SupportCandy WordPress plugin has an insecure direct object reference vulnerability that allows authenticated users to download support ticket att...

Mar 7, 2025
CVE-2025-1607
4.3

This vulnerability allows unauthorized access to the salary slip functionality in SourceCodester Best Employee Management System 1.0. Attackers can by...

Feb 24, 2025
CVE-2025-24784
4.3

CVE-2025-24784 is a privilege escalation vulnerability in kubewarden-controller where non-admin users can create AdmissionPolicyGroup resources that d...

Jan 30, 2025
CVE-2024-48897
4.3

This CVE describes an improper authorization vulnerability in Moodle where users can edit or delete RSS feeds they shouldn't have permission to modify...

Nov 18, 2024
CVE-2024-48901
4.3

This CVE describes an improper authorization vulnerability in Moodle where users can access report schedules without proper edit permissions. This aff...

Nov 18, 2024
CVE-2021-3991
4.3

This CVE describes an improper authorization vulnerability in Dolibarr ERP/CRM software where users with restricted permissions in the Reception secti...

Nov 15, 2024
CVE-2024-9531
4.3

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to send unauthorized deactivation requests for arbitrar...

Oct 24, 2024
CVE-2024-42039
4.3

This CVE describes an access control vulnerability in Huawei's SystemUI module that could allow unauthorized access to system services. Successful exp...

Sep 4, 2024
CVE-2024-39419
4.3

CVE-2024-39419 is an improper authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security measures and modif...

Aug 14, 2024
CVE-2024-39415
4.3

CVE-2024-39415 is an improper authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security measures and acces...

Aug 14, 2024
CVE-2024-39417
4.3

CVE-2024-39417 is an improper authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security measures and acces...

Aug 14, 2024
CVE-2024-39411
4.3

CVE-2024-39411 is an improper authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security measures and acces...

Aug 14, 2024
CVE-2024-39413
4.3

Adobe Commerce has an improper authorization vulnerability that allows low-privileged attackers to bypass security features and access minor informati...

Aug 14, 2024
CVE-2024-39405
4.3

Adobe Commerce has an improper authorization vulnerability that allows low-privileged attackers to bypass security features and modify minor informati...

Aug 14, 2024
CVE-2024-39407
4.3

CVE-2024-39407 is an improper authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security measures and modif...

Aug 14, 2024
CVE-2024-4819
4.3

This vulnerability is an Insecure Direct Object Reference (IDOR) in Campcodes Online Laundry Management System 1.0 that allows unauthorized access to ...

May 14, 2024
CVE-2025-12854
3.7

This vulnerability in newbee-mall-plus allows attackers to bypass authorization by manipulating the userid parameter in the executeSeckill function. I...

Nov 7, 2025
CVE-2026-20656
3.3

A logic vulnerability in Apple's iOS, iPadOS, Safari, and macOS allows malicious applications to access a user's Safari browsing history without prope...

Feb 11, 2026
CVE-2025-12623
3.1

This CVE describes an authorization bypass vulnerability in the fushengqian fuint software's authentication token handler. Attackers can potentially b...

Nov 3, 2025

About CWE-285 (CWE-285)

Our database tracks 303 CVEs classified as CWE-285, with 45 rated critical and 148 rated high severity. The average CVSS score for CWE-285 vulnerabilities is 7.2.

External reference: View CWE-285 on MITRE CWE →

Monitor CWE-285 Vulnerabilities

Get alerted when new CWE-285 CVEs affect your infrastructure.

Start Monitoring Free