CWE-287: Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

783
Total CVEs
347
Critical
320
High
8.4
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
67
2025
217
2024
134
2023
115
2022
70

Top Affected Vendors

1 Apache 15
2 Huawei 12
3 Qualcomm 12
4 Microsoft 11
5 Debian 10
6 Dlink 10
7 Cisco 10
8 Dell 9
9 Google 8
10 Fedoraproject 8

All Improper Authentication CVEs (783)

CVE-2021-1541
7.2

Multiple vulnerabilities in Cisco Small Business 220 Series Smart Switches web management interface allow attackers to hijack user sessions, execute a...

Jun 16, 2021
CVE-2021-1543
7.2

Multiple vulnerabilities in Cisco Small Business 220 Series Smart Switches web management interface allow attackers to hijack user sessions, execute a...

Jun 16, 2021
CVE-2021-20288
7.2

This CVE-2021-20288 vulnerability in Ceph allows attackers to reuse authentication keys by exploiting improper sanitization of other_keys during CEPHX...

Apr 15, 2021
CVE-2021-26070
7.2

This Broken Authentication vulnerability in Atlassian Jira allows remote attackers to bypass firewall protections for app-linked resources via the mak...

Mar 22, 2021
CVE-2025-15069
7.1

An improper authentication vulnerability in Gmission Web Fax allows attackers to bypass authentication mechanisms and escalate privileges. This affect...

Dec 29, 2025
CVE-2025-48909
7.1

This CVE describes an authentication bypass vulnerability in Huawei device management channels that could allow unauthorized access to management func...

Jun 6, 2025
CVE-2024-21543
7.1

This vulnerability in djoser authentication library allows attackers to bypass custom authentication mechanisms like 2FA, LDAP validation, or other co...

Dec 13, 2024
CVE-2022-41737
7.1

This vulnerability in IBM Storage Scale Container Native Storage Access allows a local attacker to initiate connections from a container outside its c...

Feb 17, 2024
CVE-2023-33070
7.1

CVE-2023-33070 is a vulnerability in Qualcomm Automotive OS where improper authentication to secure IO calls allows attackers to cause a transient den...

Dec 5, 2023
CVE-2021-44056
7.1

CVE-2021-44056 is an improper authentication vulnerability in QNAP Video Station that allows attackers to bypass authentication mechanisms. This affec...

May 5, 2022
CVE-2021-36949
7.1

This vulnerability in Microsoft Azure Active Directory Connect allows attackers to bypass authentication mechanisms, potentially gaining unauthorized ...

Aug 12, 2021
CVE-2021-26088
7.1

CVE-2021-26088 is an authentication bypass vulnerability in Fortinet's FSSO Collector that allows unauthenticated attackers to bypass firewall policie...

Jul 12, 2021
CVE-2020-10709
7.1

This vulnerability in Ansible Tower allows attackers to obtain non-expiring OAuth2 refresh tokens when requesting authentication tokens. Any user who ...

May 27, 2021
CVE-2020-16102
7.1

An unauthenticated remote attacker can exploit improper authentication in Gallagher Command Centre Server to create items with invalid configuration, ...

Dec 14, 2020
CVE-2026-21508
7.0

CVE-2026-21508 is an improper authentication vulnerability in Windows Storage that allows authenticated attackers to elevate privileges locally. This ...

Feb 10, 2026
CVE-2023-4677
7.0

This vulnerability allows attackers to obtain administrator session IDs from cron log backup files in Pandora FMS. By accessing these files, attackers...

Nov 23, 2023
CVE-2022-22796
7.0

This authentication bypass vulnerability in SysAid allows attackers to access the system without valid credentials by navigating through specific JSP ...

May 12, 2022
CVE-2025-30168
6.9

Parse Server versions before 7.5.2 and 8.0.2 have an authentication vulnerability where third-party authentication provider credentials can be reused ...

Mar 21, 2025
CVE-2024-55886
6.9

This vulnerability allows unauthorized users to ingest OpenTelemetry Logs data into OpenSearch Data Prepper when custom authentication plugins are imp...

Dec 12, 2024
CVE-2025-37731
6.8

CVE-2025-37731 is an improper authentication vulnerability in Elasticsearch's PKI realm that allows user impersonation via specially crafted client ce...

Dec 15, 2025
CVE-2025-0663
6.8

A cross-tenant authentication vulnerability in WSO2 products allows privileged users in one tenant to forge authentication cookies for users in other ...

Sep 23, 2025
CVE-2025-0813
6.8

This CVE describes an authentication bypass vulnerability in Schneider Electric EPAS-UI software where an attacker with physical access can reboot the...

Mar 12, 2025
CVE-2024-31800
6.8

This vulnerability allows attackers with physical access to GNCC's GC2 Indoor Security Camera 1080P to bypass authentication and gain privileged comma...

Aug 15, 2024
CVE-2025-20730
6.7

This vulnerability allows local privilege escalation on MediaTek devices due to an insecure default value in the preloader component. An attacker with...

Nov 4, 2025
CVE-2024-52968
6.7

This vulnerability allows attackers to bypass authentication on macOS systems running vulnerable FortiClient versions by using an empty password. It a...

Feb 11, 2025
CVE-2024-12510
6.7

This vulnerability in Xerox printers allows attackers with admin access to redirect LDAP authentication requests to malicious servers, potentially cap...

Feb 3, 2025
CVE-2025-3062
6.6

This vulnerability in the Drupal Admin LTE theme allows improper authentication due to CWE-287 (Improper Authentication). It affects all versions of t...

Mar 31, 2025
CVE-2024-9133
6.6

This vulnerability allows administrators to retrieve authentication tokens, potentially enabling privilege escalation or lateral movement. It affects ...

Jan 10, 2025
CVE-2025-65127
6.5

This vulnerability allows remote unauthenticated attackers to access administrative information-retrieval functions in ZBT WE2001 devices. Attackers c...

Feb 11, 2026
CVE-2025-12810
6.5

An improper authentication vulnerability in Delinea Secret Server On-Prem allows secrets with 'change password on check in' enabled to automatically c...

Jan 27, 2026
CVE-2025-69197
6.5

This vulnerability in Pterodactyl allows attackers to reuse intercepted TOTP 2FA tokens within their 60-second validity window. Users with 2FA enabled...

Jan 6, 2026
CVE-2025-15455
6.5

This vulnerability in MiniCMS allows attackers to bypass authentication and delete pages remotely without proper credentials. It affects MiniCMS versi...

Jan 5, 2026
CVE-2025-65925
6.5

A legacy API in Zeroheight SaaS allowed account creation without email verification. While unverified accounts couldn't access product features, this ...

Dec 30, 2025
CVE-2025-66174
6.5

An improper authentication vulnerability in Hikvision DVR/NVR devices allows attackers with physical access to the serial port to execute unauthorized...

Dec 19, 2025
CVE-2025-58065
6.5

Flask-AppBuilder versions before 4.8.1 have a vulnerability where the password reset endpoint remains accessible when using OAuth, LDAP, or other non-...

Sep 11, 2025
CVE-2025-53889
6.5

Directus versions 9.12.0 through 11.8.0 have an authentication bypass vulnerability in manual trigger Flows. Attackers can execute Flows without prope...

Jul 15, 2025
CVE-2025-49706
KEV EPSS 70.3% 6.5

CVE-2025-49706 is an improper authentication vulnerability in Microsoft SharePoint that allows unauthorized attackers to perform spoofing attacks over...

Jul 8, 2025
CVE-2025-46548
6.5

This vulnerability allows attackers to bypass Basic Authentication in Pekko Management when configured via Java DSL, potentially exposing management A...

Jun 3, 2025
CVE-2025-24949
6.5

CVE-2025-24949 is an authentication bypass vulnerability in JotUrl 2.0 that allows attackers to change passwords without meeting security requirements...

Apr 15, 2025
CVE-2022-45168
6.5

This vulnerability allows attackers to bypass two-factor authentication in LIVEBOX Collaboration vDesk by generating backup codes before TOTP verifica...

Jun 10, 2024
CVE-2026-1410
6.4

This vulnerability in Beetel 777VR1 routers allows attackers to bypass authentication via the UART interface, potentially gaining unauthorized access ...

Jan 26, 2026
CVE-2024-38825
6.4

This vulnerability allows attackers to bypass PKI authentication in SaltStack by presenting only a public certificate without the corresponding privat...

Jun 13, 2025
CVE-2026-2065
6.3

CVE-2026-2065 is an authentication bypass vulnerability in Flycatcher Toys smART Pixelator 2.0's Bluetooth Low Energy interface. Attackers on the loca...

Feb 6, 2026
CVE-2026-0842
6.3

CVE-2026-0842 is an authentication bypass vulnerability in Flycatcher Toys smART Sketcher's Bluetooth Low Energy interface. Attackers on the same loca...

Jan 11, 2026
CVE-2025-15135
6.3

This vulnerability allows remote attackers to bypass authentication in joey-zhou xiaozhi-esp32-server-java by manipulating cookies. The weakness in th...

Dec 28, 2025
CVE-2025-14908
6.3

CVE-2025-14908 is an authentication bypass vulnerability in JeecgBoot's multi-tenant management module that allows attackers to manipulate tenant ID p...

Dec 19, 2025
CVE-2025-10772
6.3

This vulnerability in huggingface LeRobot up to version 0.3.3 allows attackers on the local network to access ZeroMQ sockets without authentication. I...

Sep 22, 2025
CVE-2024-11209
6.3

This vulnerability in Apereo CAS 6.6 allows attackers to bypass two-factor authentication (2FA) on the /login?service endpoint, potentially leading to...

Nov 14, 2024
CVE-2025-62349
6.2

This CVE describes an authentication protocol downgrade vulnerability in Salt that allows malicious minions to bypass newer security features by using...

Jan 30, 2026
CVE-2024-47174
5.9

This vulnerability in Nix package manager allows man-in-the-middle attacks to intercept HTTPS connections without certificate validation, potentially ...

Sep 26, 2024

About Improper Authentication (CWE-287)

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Our database tracks 783 CVEs classified as CWE-287, with 347 rated critical and 320 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.4.

External reference: View CWE-287 on MITRE CWE →

Monitor Improper Authentication Vulnerabilities

Get alerted when new Improper Authentication CVEs affect your infrastructure.

Start Monitoring Free