CWE-287: Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Yearly Trend
Top Affected Vendors
All Improper Authentication CVEs (783)
Multiple vulnerabilities in Cisco Small Business 220 Series Smart Switches web management interface allow attackers to hijack user sessions, execute a...
Jun 16, 2021Multiple vulnerabilities in Cisco Small Business 220 Series Smart Switches web management interface allow attackers to hijack user sessions, execute a...
Jun 16, 2021This CVE-2021-20288 vulnerability in Ceph allows attackers to reuse authentication keys by exploiting improper sanitization of other_keys during CEPHX...
Apr 15, 2021This Broken Authentication vulnerability in Atlassian Jira allows remote attackers to bypass firewall protections for app-linked resources via the mak...
Mar 22, 2021An improper authentication vulnerability in Gmission Web Fax allows attackers to bypass authentication mechanisms and escalate privileges. This affect...
Dec 29, 2025This CVE describes an authentication bypass vulnerability in Huawei device management channels that could allow unauthorized access to management func...
Jun 6, 2025This vulnerability in djoser authentication library allows attackers to bypass custom authentication mechanisms like 2FA, LDAP validation, or other co...
Dec 13, 2024This vulnerability in IBM Storage Scale Container Native Storage Access allows a local attacker to initiate connections from a container outside its c...
Feb 17, 2024CVE-2023-33070 is a vulnerability in Qualcomm Automotive OS where improper authentication to secure IO calls allows attackers to cause a transient den...
Dec 5, 2023CVE-2021-44056 is an improper authentication vulnerability in QNAP Video Station that allows attackers to bypass authentication mechanisms. This affec...
May 5, 2022This vulnerability in Microsoft Azure Active Directory Connect allows attackers to bypass authentication mechanisms, potentially gaining unauthorized ...
Aug 12, 2021CVE-2021-26088 is an authentication bypass vulnerability in Fortinet's FSSO Collector that allows unauthenticated attackers to bypass firewall policie...
Jul 12, 2021This vulnerability in Ansible Tower allows attackers to obtain non-expiring OAuth2 refresh tokens when requesting authentication tokens. Any user who ...
May 27, 2021An unauthenticated remote attacker can exploit improper authentication in Gallagher Command Centre Server to create items with invalid configuration, ...
Dec 14, 2020CVE-2026-21508 is an improper authentication vulnerability in Windows Storage that allows authenticated attackers to elevate privileges locally. This ...
Feb 10, 2026This vulnerability allows attackers to obtain administrator session IDs from cron log backup files in Pandora FMS. By accessing these files, attackers...
Nov 23, 2023This authentication bypass vulnerability in SysAid allows attackers to access the system without valid credentials by navigating through specific JSP ...
May 12, 2022Parse Server versions before 7.5.2 and 8.0.2 have an authentication vulnerability where third-party authentication provider credentials can be reused ...
Mar 21, 2025This vulnerability allows unauthorized users to ingest OpenTelemetry Logs data into OpenSearch Data Prepper when custom authentication plugins are imp...
Dec 12, 2024CVE-2025-37731 is an improper authentication vulnerability in Elasticsearch's PKI realm that allows user impersonation via specially crafted client ce...
Dec 15, 2025A cross-tenant authentication vulnerability in WSO2 products allows privileged users in one tenant to forge authentication cookies for users in other ...
Sep 23, 2025This CVE describes an authentication bypass vulnerability in Schneider Electric EPAS-UI software where an attacker with physical access can reboot the...
Mar 12, 2025This vulnerability allows attackers with physical access to GNCC's GC2 Indoor Security Camera 1080P to bypass authentication and gain privileged comma...
Aug 15, 2024This vulnerability allows local privilege escalation on MediaTek devices due to an insecure default value in the preloader component. An attacker with...
Nov 4, 2025This vulnerability allows attackers to bypass authentication on macOS systems running vulnerable FortiClient versions by using an empty password. It a...
Feb 11, 2025This vulnerability in Xerox printers allows attackers with admin access to redirect LDAP authentication requests to malicious servers, potentially cap...
Feb 3, 2025This vulnerability in the Drupal Admin LTE theme allows improper authentication due to CWE-287 (Improper Authentication). It affects all versions of t...
Mar 31, 2025This vulnerability allows administrators to retrieve authentication tokens, potentially enabling privilege escalation or lateral movement. It affects ...
Jan 10, 2025This vulnerability allows remote unauthenticated attackers to access administrative information-retrieval functions in ZBT WE2001 devices. Attackers c...
Feb 11, 2026An improper authentication vulnerability in Delinea Secret Server On-Prem allows secrets with 'change password on check in' enabled to automatically c...
Jan 27, 2026This vulnerability in Pterodactyl allows attackers to reuse intercepted TOTP 2FA tokens within their 60-second validity window. Users with 2FA enabled...
Jan 6, 2026This vulnerability in MiniCMS allows attackers to bypass authentication and delete pages remotely without proper credentials. It affects MiniCMS versi...
Jan 5, 2026A legacy API in Zeroheight SaaS allowed account creation without email verification. While unverified accounts couldn't access product features, this ...
Dec 30, 2025An improper authentication vulnerability in Hikvision DVR/NVR devices allows attackers with physical access to the serial port to execute unauthorized...
Dec 19, 2025Flask-AppBuilder versions before 4.8.1 have a vulnerability where the password reset endpoint remains accessible when using OAuth, LDAP, or other non-...
Sep 11, 2025Directus versions 9.12.0 through 11.8.0 have an authentication bypass vulnerability in manual trigger Flows. Attackers can execute Flows without prope...
Jul 15, 2025CVE-2025-49706 is an improper authentication vulnerability in Microsoft SharePoint that allows unauthorized attackers to perform spoofing attacks over...
Jul 8, 2025This vulnerability allows attackers to bypass Basic Authentication in Pekko Management when configured via Java DSL, potentially exposing management A...
Jun 3, 2025CVE-2025-24949 is an authentication bypass vulnerability in JotUrl 2.0 that allows attackers to change passwords without meeting security requirements...
Apr 15, 2025This vulnerability allows attackers to bypass two-factor authentication in LIVEBOX Collaboration vDesk by generating backup codes before TOTP verifica...
Jun 10, 2024This vulnerability in Beetel 777VR1 routers allows attackers to bypass authentication via the UART interface, potentially gaining unauthorized access ...
Jan 26, 2026This vulnerability allows attackers to bypass PKI authentication in SaltStack by presenting only a public certificate without the corresponding privat...
Jun 13, 2025CVE-2026-2065 is an authentication bypass vulnerability in Flycatcher Toys smART Pixelator 2.0's Bluetooth Low Energy interface. Attackers on the loca...
Feb 6, 2026CVE-2026-0842 is an authentication bypass vulnerability in Flycatcher Toys smART Sketcher's Bluetooth Low Energy interface. Attackers on the same loca...
Jan 11, 2026This vulnerability allows remote attackers to bypass authentication in joey-zhou xiaozhi-esp32-server-java by manipulating cookies. The weakness in th...
Dec 28, 2025CVE-2025-14908 is an authentication bypass vulnerability in JeecgBoot's multi-tenant management module that allows attackers to manipulate tenant ID p...
Dec 19, 2025This vulnerability in huggingface LeRobot up to version 0.3.3 allows attackers on the local network to access ZeroMQ sockets without authentication. I...
Sep 22, 2025This vulnerability in Apereo CAS 6.6 allows attackers to bypass two-factor authentication (2FA) on the /login?service endpoint, potentially leading to...
Nov 14, 2024This CVE describes an authentication protocol downgrade vulnerability in Salt that allows malicious minions to bypass newer security features by using...
Jan 30, 2026This vulnerability in Nix package manager allows man-in-the-middle attacks to intercept HTTPS connections without certificate validation, potentially ...
Sep 26, 2024About Improper Authentication (CWE-287)
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Our database tracks 783 CVEs classified as CWE-287, with 347 rated critical and 320 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.4.
External reference: View CWE-287 on MITRE CWE →
Monitor Improper Authentication Vulnerabilities
Get alerted when new Improper Authentication CVEs affect your infrastructure.
Start Monitoring Free