CWE-287: Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Yearly Trend
Top Affected Vendors
All Improper Authentication CVEs (774)
This vulnerability allows unauthenticated attackers to gain administrator access to Zyxel NBG2105 routers by setting a login cookie value to 1. It aff...
Jan 26, 2021This vulnerability allows attackers to bypass authentication in Guangzhou Hongfan Technology's iOffice20 software through a logical flaw, enabling una...
Mar 21, 2025This vulnerability allows attackers to bypass Windows authentication by exploiting AuthContext tokens in replay attacks. It affects Windows systems wi...
Mar 13, 2025An improper authentication vulnerability in GitHub Enterprise Server allows unauthorized users to modify other users' secret gists by authenticating t...
Apr 7, 2023This vulnerability allows attackers to bypass authentication in Atlassian Connect Express (ACE) by sending context JWTs to lifecycle endpoints where o...
Apr 16, 2021This vulnerability allows attackers to bypass two-factor authentication in Nagios Fusion by brute-forcing OTP codes due to insufficient rate limiting....
Oct 27, 2025This vulnerability allows unauthorized devices to bypass authentication and access distributed camera functions without user consent. It affects Huawe...
Jul 7, 2025CVE-2024-28992 is a directory traversal and information disclosure vulnerability in SolarWinds Access Rights Manager that allows unauthenticated attac...
Jul 17, 2024This vulnerability in Delinea PAM Secret Server allows users with 'Administer Reports' permission or those in UNLIMITED ADMIN MODE to gain unauthorize...
Mar 14, 2024This vulnerability in Strapi allows malicious users to modify private fields in their user records during registration. It affects all Strapi instance...
Nov 6, 2023CVE-2025-68931 is a cryptographic vulnerability in Jervis library versions before 2.2 where AES/CBC/PKCS5Padding lacks authentication, enabling paddin...
Jan 13, 2026This vulnerability allows attackers to bypass authentication mechanisms in Broadcom DX NetOps Spectrum, potentially gaining unauthorized access to net...
Jan 12, 2026This authentication bypass vulnerability in Revotech I6032W-FHW devices allows attackers to access sensitive information and escalate privileges witho...
Jan 2, 2026An improper authentication vulnerability in TP-Link WA850RE Wi-Fi range extenders allows unauthenticated attackers to download the device configuratio...
Dec 18, 2025This vulnerability in Memos note-taking service allows attackers to maintain access to compromised accounts even after users change their passwords. A...
Nov 14, 2025This vulnerability allows incoming FaceTime calls to appear or be accepted on locked macOS devices even when lock screen notifications are disabled. T...
Sep 15, 2025CVE-2025-55171 is an authentication bypass vulnerability in WeGIA web management software that allows unauthenticated attackers to delete arbitrary im...
Aug 12, 2025The Customer Email Verification for WooCommerce WordPress plugin has an authentication bypass vulnerability that allows authenticated attackers with C...
Feb 12, 2025This vulnerability allows attackers to forge JWT tokens for any user in macrozheng mall-tiny 1.0.1, enabling complete authentication bypass. Attackers...
Jan 31, 2025NiceGUI versions before 2.9.1 have an authentication bypass vulnerability where logging in from one browser automatically authenticates all browsers, ...
Jan 6, 2025This vulnerability allows attackers on the same network as a Wyze Cam v3 to execute arbitrary code without authentication by exploiting improper authe...
Nov 22, 2024This vulnerability allows unauthenticated attackers to read device information from Zyxel P-6101C ADSL modems via crafted HTTP HEAD requests. It affec...
Nov 20, 2024This CVE describes an improper authentication vulnerability in Adobe ColdFusion that allows attackers to bypass authentication mechanisms and escalate...
Sep 13, 2024This authentication bypass vulnerability in Ivanti EPMM allows remote attackers to access sensitive resources without proper credentials. It affects I...
Aug 7, 2024This vulnerability in Hush Line allows attackers to bypass two-factor authentication (2FA) when changing security settings. Attackers with CSRF or XSS...
Jun 27, 2024An authentication bypass vulnerability in Rockwell Automation FactoryTalk View SE v12 allows remote users to access HMI projects without proper authen...
Jun 14, 2024This vulnerability allows attackers to bypass authentication in the WordPress Admin and Site Enhancements (ASE) plugin, granting unauthorized access t...
Jun 4, 2024CVE-2024-26331 is an authentication bypass vulnerability in ReCrystallize Server 5.10.0.0 where attackers can modify cookie values to gain unauthorize...
Apr 30, 2024This CVE describes an improper authentication vulnerability in Elementor Website Builder that allows users with contributor-level access to read arbit...
Apr 24, 2024This CVE describes an improper authentication vulnerability in the Iaware module on Huawei devices running HarmonyOS. Attackers could exploit this to ...
Apr 8, 2024This vulnerability allows a read-only user to escalate privileges to read-write access through successive login attempts in FortiOS when configured wi...
Mar 12, 2024This vulnerability in iNet wireless daemon (IWD) allows attackers to bypass Wi-Fi network authentication by exploiting a flaw in the EAPOL handshake. ...
Feb 22, 2024This CVE describes an authentication bypass vulnerability in GitHub Enterprise Server's Private Mode. Attackers with network access can craft API requ...
Dec 21, 2023This vulnerability allows attackers to spoof DPAPI (Data Protection API) calls on Windows systems, potentially enabling them to decrypt protected data...
Dec 12, 2023This vulnerability allows attackers to bypass PKCE (Proof Key for Code Exchange) protection in authentik's OAuth2 flows. When an OAuth2 flow is initia...
Nov 21, 2023CloudExplorer Lite versions before 1.4.1 contain an authentication bypass vulnerability in the gateway filter. Attackers can access protected API endp...
Oct 30, 2023This vulnerability allows attackers to perform brute-force attacks against device authentication modules, potentially compromising service confidentia...
Oct 11, 2023This vulnerability allows unauthenticated users to bypass authentication for the Bull dashboard job queue management interface in Misskey by editing U...
Oct 4, 2023CVE-2023-43805 is an authentication bypass vulnerability in Nexkey (a Misskey fork) that allows attackers to access the job queue dashboard without pr...
Oct 4, 2023This vulnerability allows remote attackers to bypass authentication and access sensitive information via the rootDesc.xml page of the UPnP service on ...
Sep 15, 2023This CVE describes an improper authentication vulnerability in Proself products that allows remote unauthenticated attackers to bypass login controls ...
Aug 18, 2023An authentication bypass vulnerability in Suprema BioStar 2 access control systems allows unauthenticated attackers to access certain server functiona...
Aug 3, 2023This authentication bypass vulnerability in OpenThread border router implementations allows unauthenticated attackers to craft radio frames using Key ...
Jul 25, 2023This vulnerability allows malicious apps to bypass identity verification during pre-authorization, potentially gaining unauthorized access to system r...
Jun 19, 2023This vulnerability allows malicious applications to bypass proper identity verification during pre-authorization processes. Attackers can exploit this...
Jun 19, 2023This vulnerability allows attackers to bypass authentication on D-Link DIR-890L routers running firmware version 1.10 A1. Attackers can gain unauthori...
May 1, 2023This CVE describes an authentication misconfiguration vulnerability in Android's PasspointXmlUtils.java that could allow remote information disclosure...
Mar 24, 2023This vulnerability in SolarWinds SAM occurs when polling via IP address forces NTLM authentication instead of the expected Kerberos, potentially expos...
Feb 15, 2023CVE-2016-0796 affects WordPress mb.miniAudioPlayer plugin versions up to 1.7.6, allowing attackers to bypass security controls and download arbitrary ...
Jul 28, 2022CVE-2022-31164 is an authentication bypass vulnerability in Tovy, a Roblox group staff management system. It allows any user to log in as other users,...
Jul 22, 2022About Improper Authentication (CWE-287)
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Our database tracks 774 CVEs classified as CWE-287, with 342 rated critical and 316 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.3.
External reference: View CWE-287 on MITRE CWE →
Monitor Improper Authentication Vulnerabilities
Get alerted when new Improper Authentication CVEs affect your infrastructure.
Start Monitoring Free