CWE-287: Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Yearly Trend
Top Affected Vendors
All Improper Authentication CVEs (790)
CVE-2026-0842 is an authentication bypass vulnerability in Flycatcher Toys smART Sketcher's Bluetooth Low Energy interface. Attackers on the same loca...
Jan 11, 2026This vulnerability allows remote attackers to bypass authentication in joey-zhou xiaozhi-esp32-server-java by manipulating cookies. The weakness in th...
Dec 28, 2025CVE-2025-14908 is an authentication bypass vulnerability in JeecgBoot's multi-tenant management module that allows attackers to manipulate tenant ID p...
Dec 19, 2025This vulnerability in huggingface LeRobot up to version 0.3.3 allows attackers on the local network to access ZeroMQ sockets without authentication. I...
Sep 22, 2025This vulnerability in Apereo CAS 6.6 allows attackers to bypass two-factor authentication (2FA) on the /login?service endpoint, potentially leading to...
Nov 14, 2024This CVE describes an authentication protocol downgrade vulnerability in Salt that allows malicious minions to bypass newer security features by using...
Jan 30, 2026This vulnerability in Nix package manager allows man-in-the-middle attacks to intercept HTTPS connections without certificate validation, potentially ...
Sep 26, 2024This vulnerability allows attackers to bypass app-native authentication in WSO2 Identity Server 7.0.0 by passing invalid objects. Organizations using ...
May 22, 2025CVE-2025-56578 is an authentication bypass vulnerability in RTSPtoWeb v2.4.3 that allows remote attackers to access sensitive information and execute ...
Sep 10, 2025This vulnerability allows physically proximate attackers to bypass the screen lock mechanism in Trust Wallet v8.45 and view wallet balances without au...
Jul 1, 2025This vulnerability allows remote attackers to bypass authentication in Chia Blockchain's RPC interface by manipulating the _authenticate function. It ...
Feb 25, 2026This vulnerability allows attackers to bypass authentication in CRMEB systems by manipulating the uid parameter in the remoteRegister function. It aff...
Jan 20, 2026This vulnerability allows attackers to bypass authentication in novel-plus by replaying CAPTCHA tokens, potentially gaining unauthorized access to adm...
Jun 24, 2025This CVE describes an improper authentication vulnerability in WCMS that allows attackers to bypass authentication mechanisms by manipulating the uid ...
May 25, 2025An unauthenticated database manipulation vulnerability in WhatsUp Gold allows attackers to modify the WrlsMacAddressGroup table without credentials. T...
Apr 14, 2025An authorization vulnerability in iOS and iPadOS allows attackers with physical access to a locked device to view sensitive user information. This aff...
Feb 11, 2026This vulnerability in Paperless-ngx allows remote authenticated users to access the API even when API access has been explicitly disabled in the confi...
May 15, 2024This vulnerability in django-allauth allows attackers to potentially impersonate users when using Okta or NetIQ third-party authentication. The issue ...
Dec 15, 2025This authentication bypass vulnerability allows attackers with valid credentials to circumvent multi-factor authentication under specific conditions, ...
Oct 23, 2025This vulnerability in AxxonSoft Axxon One (C-Werk) allows authenticated remote attackers to bypass proper LDAP group membership evaluation during logi...
Sep 10, 2025This vulnerability in Qualcomm UE (User Equipment) authentication processing allows improper authentication that could lead to information disclosure....
Mar 3, 2025This vulnerability allows Active Directory users with expired or disabled accounts to bypass AD restrictions and regain access in Keycloak. It affects...
Jan 22, 2025This vulnerability in Drupal's Login Disable module allows attackers to bypass authentication controls when the module is incorrectly configured. It a...
Jan 9, 2025This vulnerability allows authenticated users in Devolutions Remote Desktop Manager to bypass multi-factor authentication (MFA) by switching data sour...
Nov 25, 2024A vulnerability in matrix-rust-sdk's matrix-sdk-crypto crate allows a malicious homeserver to manipulate the UserIdentity::is_verified() method to inc...
Jul 18, 2024This vulnerability in PocketBase allows account takeover when both OAuth2 and password authentication are enabled. A malicious user can register with ...
Jun 18, 2024This vulnerability allows attackers to perform password brute-forcing attacks against Wispotter systems due to improper restriction of authentication ...
Feb 18, 2026This vulnerability allows attackers to bypass intended access controls in the Product Delivery Date for WooCommerce Lite plugin. Attackers can perform...
Dec 23, 2025This vulnerability allows remote attackers to bypass authentication in Shiguangwu sgwbox N3 NAS devices by manipulating the token argument in the POST...
Dec 15, 2025This CVE describes an authentication bypass vulnerability in haxxorsid Stock-Management-System that allows unauthenticated remote attackers to access ...
Dec 12, 2025This vulnerability allows remote attackers to access the ONVIF service on Apeman ID71 cameras without authentication. Attackers can potentially manipu...
Oct 16, 2025This CVE describes an improper authentication vulnerability in roncoo-pay's /user/info/list endpoint, allowing remote attackers to bypass authenticati...
Sep 12, 2025This CVE describes a PendingIntent hijacking vulnerability in Samsung's CertificatePolicy framework component that allows local attackers to bypass co...
Sep 3, 2025This vulnerability allows unauthenticated attackers to calculate the root password of Tenda AC8 routers using a static algorithm based on the device's...
Aug 28, 2025This vulnerability allows attackers to bypass authentication in My-Blog 1.0.0 by capturing and replaying authentication data. It affects all users run...
Aug 18, 2025CVE-2025-8964 is an improper authentication vulnerability in code-projects Hostel Management System 1.0 that allows attackers to bypass login controls...
Aug 14, 2025This vulnerability allows attackers to guess CAPTCHA codes in the pybbs admin login page, potentially enabling brute-force attacks against administrat...
Aug 5, 2025This vulnerability allows remote attackers to bypass authentication on Lucky Technology LM-520 series devices. Affected systems include LM-520-SC, LM-...
Jun 9, 2025CVE-2025-5872 is an authentication bypass vulnerability in eGauge EG3000 Energy Monitor's Setting Handler component. Attackers can remotely access set...
Jun 9, 2025This critical vulnerability in Multilaser Sirius RE016 routers allows attackers to bypass authentication on the password change handler remotely. Atta...
Jun 2, 2025This vulnerability allows unauthenticated remote attackers to reboot TOTOLINK A720R routers by accessing the /cgi-bin/cstecgi.cgi endpoint with a spec...
May 5, 2025This CVE describes an authentication bypass vulnerability in Novel-Plus software that allows unauthenticated attackers to access session management fu...
Apr 28, 2025This vulnerability allows remote attackers to bypass authentication on BEC Technologies routers without credentials. Attackers can access the web-base...
Apr 23, 2025Spring Cloud Config Server may ignore client-provided Vault tokens via X-CONFIG-TOKEN header, causing it to persistently use the first token retrieved...
Apr 10, 2025This vulnerability allows remote attackers to bypass authentication mechanisms in TinyWebServer by manipulating the m_url_real argument in http/http_c...
Apr 4, 2025This critical vulnerability in IROAD Dash Cam X5 and X6 allows remote attackers to access video footage and live streams without authentication due to...
Mar 16, 2025CVE-2025-2339 is an improper authentication vulnerability in otale Tale Blog 2.0.5 that allows remote attackers to bypass authentication mechanisms an...
Mar 16, 2025This vulnerability allows a local attacker to perform a man-in-the-middle attack on Apache Cassandra's RMI registry, capturing JMX interface credentia...
Feb 4, 2025CVE-2024-10620 is an improper authentication vulnerability in knightliao Disconf's Configuration Center API endpoint (/api/config/list) that allows re...
Nov 1, 2024This vulnerability allows unauthorized access to Private Browsing tabs in Apple's Safari browser without proper authentication. It affects iOS and iPa...
Sep 17, 2024About Improper Authentication (CWE-287)
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Our database tracks 790 CVEs classified as CWE-287, with 349 rated critical and 325 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.4.
External reference: View CWE-287 on MITRE CWE →
Monitor Improper Authentication Vulnerabilities
Get alerted when new Improper Authentication CVEs affect your infrastructure.
Start Monitoring Free