CWE-287: Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

774
Total CVEs
342
Critical
316
High
8.3
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
67
2025
217
2024
134
2023
115
2022
70

Top Affected Vendors

1 Apache 15
2 Qualcomm 12
3 Huawei 11
4 Microsoft 11
5 Debian 10
6 Dlink 9
7 Cisco 9
8 Dell 9
9 Google 8
10 Fedoraproject 8

All Improper Authentication CVEs (774)

CVE-2021-3297
7.8

This vulnerability allows unauthenticated attackers to gain administrator access to Zyxel NBG2105 routers by setting a login cookie value to 1. It aff...

Jan 26, 2021
CVE-2024-57490
7.7

This vulnerability allows attackers to bypass authentication in Guangzhou Hongfan Technology's iOffice20 software through a logical flaw, enabling una...

Mar 21, 2025
CVE-2025-2230
7.7

This vulnerability allows attackers to bypass Windows authentication by exploiting AuthContext tokens in replay attacks. It affects Windows systems wi...

Mar 13, 2025
CVE-2023-23761
7.7

An improper authentication vulnerability in GitHub Enterprise Server allows unauthorized users to modify other users' secret gists by authenticating t...

Apr 7, 2023
CVE-2021-26073
7.7

This vulnerability allows attackers to bypass authentication in Atlassian Connect Express (ACE) by sending context JWTs to lifecycle endpoints where o...

Apr 16, 2021
CVE-2025-60424
7.6

This vulnerability allows attackers to bypass two-factor authentication in Nagios Fusion by brute-forcing OTP codes due to insufficient rate limiting....

Oct 27, 2025
CVE-2025-53169
7.6

This vulnerability allows unauthorized devices to bypass authentication and access distributed camera functions without user consent. It affects Huawe...

Jul 7, 2025
CVE-2024-28992
7.6

CVE-2024-28992 is a directory traversal and information disclosure vulnerability in SolarWinds Access Rights Manager that allows unauthenticated attac...

Jul 17, 2024
CVE-2024-25652
7.6

This vulnerability in Delinea PAM Secret Server allows users with 'Administer Reports' permission or those in UNLIMITED ADMIN MODE to gain unauthorize...

Mar 14, 2024
CVE-2023-39345
7.6

This vulnerability in Strapi allows malicious users to modify private fields in their user records during registration. It affects all Strapi instance...

Nov 6, 2023
CVE-2025-68931
7.5

CVE-2025-68931 is a cryptographic vulnerability in Jervis library versions before 2.2 where AES/CBC/PKCS5Padding lacks authentication, enabling paddin...

Jan 13, 2026
CVE-2025-69273
7.5

This vulnerability allows attackers to bypass authentication mechanisms in Broadcom DX NetOps Spectrum, potentially gaining unauthorized access to net...

Jan 12, 2026
CVE-2025-67158
7.5

This authentication bypass vulnerability in Revotech I6032W-FHW devices allows attackers to access sensitive information and escalate privileges witho...

Jan 2, 2026
CVE-2025-14738
7.5

An improper authentication vulnerability in TP-Link WA850RE Wi-Fi range extenders allows unauthenticated attackers to download the device configuratio...

Dec 18, 2025
CVE-2024-21635
7.5

This vulnerability in Memos note-taking service allows attackers to maintain access to compromised accounts even after users change their passwords. A...

Nov 14, 2025
CVE-2025-31271
7.5

This vulnerability allows incoming FaceTime calls to appear or be accepted on locked macOS devices even when lock screen notifications are disabled. T...

Sep 15, 2025
CVE-2025-55171
7.5

CVE-2025-55171 is an authentication bypass vulnerability in WeGIA web management software that allows unauthenticated attackers to delete arbitrary im...

Aug 12, 2025
CVE-2024-13528
7.5

The Customer Email Verification for WooCommerce WordPress plugin has an authentication bypass vulnerability that allows authenticated attackers with C...

Feb 12, 2025
CVE-2024-57432
7.5

This vulnerability allows attackers to forge JWT tokens for any user in macrozheng mall-tiny 1.0.1, enabling complete authentication bypass. Attackers...

Jan 31, 2025
CVE-2025-21618
7.5

NiceGUI versions before 2.9.1 have an authentication bypass vulnerability where logging in from one browser automatically authenticates all browsers, ...

Jan 6, 2025
CVE-2024-6248
7.5

This vulnerability allows attackers on the same network as a Wyze Cam v3 to execute arbitrary code without authentication by exploiting improper authe...

Nov 22, 2024
CVE-2024-11494
7.5

This vulnerability allows unauthenticated attackers to read device information from Zyxel P-6101C ADSL modems via crafted HTTP HEAD requests. It affec...

Nov 20, 2024
CVE-2024-45113
7.5

This CVE describes an improper authentication vulnerability in Adobe ColdFusion that allows attackers to bypass authentication mechanisms and escalate...

Sep 13, 2024
CVE-2024-36132
7.5

This authentication bypass vulnerability in Ivanti EPMM allows remote attackers to access sensitive resources without proper credentials. It affects I...

Aug 7, 2024
CVE-2024-38523
7.5

This vulnerability in Hush Line allows attackers to bypass two-factor authentication (2FA) when changing security settings. Attackers with CSRF or XSS...

Jun 27, 2024
CVE-2024-37367
7.5

An authentication bypass vulnerability in Rockwell Automation FactoryTalk View SE v12 allows remote users to access HMI projects without proper authen...

Jun 14, 2024
CVE-2023-46630
7.5

This vulnerability allows attackers to bypass authentication in the WordPress Admin and Site Enhancements (ASE) plugin, granting unauthorized access t...

Jun 4, 2024
CVE-2024-26331
7.5

CVE-2024-26331 is an authentication bypass vulnerability in ReCrystallize Server 5.10.0.0 where attackers can modify cookie values to gain unauthorize...

Apr 30, 2024
CVE-2023-47504
7.5

This CVE describes an improper authentication vulnerability in Elementor Website Builder that allows users with contributor-level access to read arbit...

Apr 24, 2024
CVE-2023-52540
7.5

This CVE describes an improper authentication vulnerability in the Iaware module on Huawei devices running HarmonyOS. Attackers could exploit this to ...

Apr 8, 2024
CVE-2023-46717
7.5

This vulnerability allows a read-only user to escalate privileges to read-write access through successive login attempts in FortiOS when configured wi...

Mar 12, 2024
CVE-2023-52161
7.5

This vulnerability in iNet wireless daemon (IWD) allows attackers to bypass Wi-Fi network authentication by exploiting a flaw in the EAPOL handshake. ...

Feb 22, 2024
CVE-2023-6847
7.5

This CVE describes an authentication bypass vulnerability in GitHub Enterprise Server's Private Mode. Attackers with network access can craft API requ...

Dec 21, 2023
CVE-2023-36004
7.5

This vulnerability allows attackers to spoof DPAPI (Data Protection API) calls on Windows systems, potentially enabling them to decrypt protected data...

Dec 12, 2023
CVE-2023-48228
7.5

This vulnerability allows attackers to bypass PKCE (Proof Key for Code Exchange) protection in authentik's OAuth2 flows. When an OAuth2 flow is initia...

Nov 21, 2023
CVE-2023-44397
7.5

CloudExplorer Lite versions before 1.4.1 contain an authentication bypass vulnerability in the gateway filter. Attackers can access protected API endp...

Oct 30, 2023
CVE-2023-44096
7.5

This vulnerability allows attackers to perform brute-force attacks against device authentication modules, potentially compromising service confidentia...

Oct 11, 2023
CVE-2023-43793
7.5

This vulnerability allows unauthenticated users to bypass authentication for the Bull dashboard job queue management interface in Misskey by editing U...

Oct 4, 2023
CVE-2023-43805
7.5

CVE-2023-43805 is an authentication bypass vulnerability in Nexkey (a Misskey fork) that allows attackers to access the job queue dashboard without pr...

Oct 4, 2023
CVE-2022-47848
7.5

This vulnerability allows remote attackers to bypass authentication and access sensitive information via the rootDesc.xml page of the UPnP service on ...

Sep 15, 2023
CVE-2023-39415
7.5

This CVE describes an improper authentication vulnerability in Proself products that allows remote unauthenticated attackers to bypass login controls ...

Aug 18, 2023
CVE-2023-33363
7.5

An authentication bypass vulnerability in Suprema BioStar 2 access control systems allows unauthenticated attackers to access certain server functiona...

Aug 3, 2023
CVE-2023-2626
7.5

This authentication bypass vulnerability in OpenThread border router implementations allows unauthenticated attackers to craft radio frames using Key ...

Jul 25, 2023
CVE-2022-48494
7.5

This vulnerability allows malicious apps to bypass identity verification during pre-authorization, potentially gaining unauthorized access to system r...

Jun 19, 2023
CVE-2022-48496
7.5

This vulnerability allows malicious applications to bypass proper identity verification during pre-authorization processes. Attackers can exploit this...

Jun 19, 2023
CVE-2023-30063
7.5

This vulnerability allows attackers to bypass authentication on D-Link DIR-890L routers running firmware version 1.10 A1. Attackers can gain unauthori...

May 1, 2023
CVE-2023-21027
7.5

This CVE describes an authentication misconfiguration vulnerability in Android's PasspointXmlUtils.java that could allow remote information disclosure...

Mar 24, 2023
CVE-2022-47508
7.5

This vulnerability in SolarWinds SAM occurs when polling via IP address forces NTLM authentication instead of the expected Kerberos, potentially expos...

Feb 15, 2023
CVE-2016-0796
7.5

CVE-2016-0796 affects WordPress mb.miniAudioPlayer plugin versions up to 1.7.6, allowing attackers to bypass security controls and download arbitrary ...

Jul 28, 2022
CVE-2022-31164
7.5

CVE-2022-31164 is an authentication bypass vulnerability in Tovy, a Roblox group staff management system. It allows any user to log in as other users,...

Jul 22, 2022

About Improper Authentication (CWE-287)

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Our database tracks 774 CVEs classified as CWE-287, with 342 rated critical and 316 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.3.

External reference: View CWE-287 on MITRE CWE →

Monitor Improper Authentication Vulnerabilities

Get alerted when new Improper Authentication CVEs affect your infrastructure.

Start Monitoring Free