CWE-287: Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

790
Total CVEs
349
Critical
325
High
8.4
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
67
2025
217
2024
134
2023
115
2022
70

Top Affected Vendors

1 Apache 15
2 Huawei 12
3 Qualcomm 12
4 Microsoft 11
5 Debian 10
6 Dlink 10
7 Cisco 10
8 Google 9
9 Dell 9
10 Netgear 9

All Improper Authentication CVEs (790)

CVE-2026-0842
6.3

CVE-2026-0842 is an authentication bypass vulnerability in Flycatcher Toys smART Sketcher's Bluetooth Low Energy interface. Attackers on the same loca...

Jan 11, 2026
CVE-2025-15135
6.3

This vulnerability allows remote attackers to bypass authentication in joey-zhou xiaozhi-esp32-server-java by manipulating cookies. The weakness in th...

Dec 28, 2025
CVE-2025-14908
6.3

CVE-2025-14908 is an authentication bypass vulnerability in JeecgBoot's multi-tenant management module that allows attackers to manipulate tenant ID p...

Dec 19, 2025
CVE-2025-10772
6.3

This vulnerability in huggingface LeRobot up to version 0.3.3 allows attackers on the local network to access ZeroMQ sockets without authentication. I...

Sep 22, 2025
CVE-2024-11209
6.3

This vulnerability in Apereo CAS 6.6 allows attackers to bypass two-factor authentication (2FA) on the /login?service endpoint, potentially leading to...

Nov 14, 2024
CVE-2025-62349
6.2

This CVE describes an authentication protocol downgrade vulnerability in Salt that allows malicious minions to bypass newer security features by using...

Jan 30, 2026
CVE-2024-47174
5.9

This vulnerability in Nix package manager allows man-in-the-middle attacks to intercept HTTPS connections without certificate validation, potentially ...

Sep 26, 2024
CVE-2024-7487
5.8

This vulnerability allows attackers to bypass app-native authentication in WSO2 Identity Server 7.0.0 by passing invalid objects. Organizations using ...

May 22, 2025
CVE-2025-56578
5.7

CVE-2025-56578 is an authentication bypass vulnerability in RTSPtoWeb v2.4.3 that allows remote attackers to access sensitive information and execute ...

Sep 10, 2025
CVE-2025-52294
5.7

This vulnerability allows physically proximate attackers to bypass the screen lock mechanism in Trust Wallet v8.45 and view wallet balances without au...

Jul 1, 2025
CVE-2026-3192
5.6

This vulnerability allows remote attackers to bypass authentication in Chia Blockchain's RPC interface by manipulating the _authenticate function. It ...

Feb 25, 2026
CVE-2026-1203
5.6

This vulnerability allows attackers to bypass authentication in CRMEB systems by manipulating the uid parameter in the remoteRegister function. It aff...

Jan 20, 2026
CVE-2025-6533
5.6

This vulnerability allows attackers to bypass authentication in novel-plus by replaying CAPTCHA tokens, potentially gaining unauthorized access to adm...

Jun 24, 2025
CVE-2025-5149
5.6

This CVE describes an improper authentication vulnerability in WCMS that allows attackers to bypass authentication mechanisms by manipulating the uid ...

May 25, 2025
CVE-2025-2572
5.6

An unauthenticated database manipulation vulnerability in WhatsUp Gold allows attackers to modify the WrlsMacAddressGroup table without credentials. T...

Apr 14, 2025
CVE-2026-20655
5.5

An authorization vulnerability in iOS and iPadOS allows attackers with physical access to a locked device to view sensitive user information. This aff...

Feb 11, 2026
CVE-2024-35184
5.5

This vulnerability in Paperless-ngx allows remote authenticated users to access the API even when API access has been explicitly disabled in the confi...

May 15, 2024
CVE-2025-65431
5.4

This vulnerability in django-allauth allows attackers to potentially impersonate users when using Okta or NetIQ third-party authentication. The issue ...

Dec 15, 2025
CVE-2025-62398
5.4

This authentication bypass vulnerability allows attackers with valid credentials to circumvent multi-factor authentication under specific conditions, ...

Oct 23, 2025
CVE-2025-10224
5.4

This vulnerability in AxxonSoft Axxon One (C-Werk) allows authenticated remote attackers to bypass proper LDAP group membership evaluation during logi...

Sep 10, 2025
CVE-2024-38426
5.4

This vulnerability in Qualcomm UE (User Equipment) authentication processing allows improper authentication that could lead to information disclosure....

Mar 3, 2025
CVE-2025-0604
5.4

This vulnerability allows Active Directory users with expired or disabled accounts to bypass AD restrictions and regain access in Keycloak. It affects...

Jan 22, 2025
CVE-2024-13309
5.4

This vulnerability in Drupal's Login Disable module allows attackers to bypass authentication controls when the module is incorrectly configured. It a...

Jan 9, 2025
CVE-2024-11671
5.4

This vulnerability allows authenticated users in Devolutions Remote Desktop Manager to bypass multi-factor authentication (MFA) by switching data sour...

Nov 25, 2024
CVE-2024-40648
5.4

A vulnerability in matrix-rust-sdk's matrix-sdk-crypto crate allows a malicious homeserver to manipulate the UserIdentity::is_verified() method to inc...

Jul 18, 2024
CVE-2024-38351
5.4

This vulnerability in PocketBase allows account takeover when both OAuth2 and password authentication are enabled. A malicious user can register with ...

Jun 18, 2024
CVE-2025-7630
5.3

This vulnerability allows attackers to perform password brute-forcing attacks against Wispotter systems due to improper restriction of authentication ...

Feb 18, 2026
CVE-2023-52210
5.3

This vulnerability allows attackers to bypass intended access controls in the Product Delivery Date for WooCommerce Lite plugin. Attackers can perform...

Dec 23, 2025
CVE-2025-14703
5.3

This vulnerability allows remote attackers to bypass authentication in Shiguangwu sgwbox N3 NAS devices by manipulating the token argument in the POST...

Dec 15, 2025
CVE-2025-14567
5.3

This CVE describes an authentication bypass vulnerability in haxxorsid Stock-Management-System that allows unauthenticated remote attackers to access ...

Dec 12, 2025
CVE-2025-11852
5.3

This vulnerability allows remote attackers to access the ONVIF service on Apeman ID71 cameras without authentication. Attackers can potentially manipu...

Oct 16, 2025
CVE-2025-10288
5.3

This CVE describes an improper authentication vulnerability in roncoo-pay's /user/info/list endpoint, allowing remote attackers to bypass authenticati...

Sep 12, 2025
CVE-2023-21466
5.3

This CVE describes a PendingIntent hijacking vulnerability in Samsung's CertificatePolicy framework component that allows local attackers to bypass co...

Sep 3, 2025
CVE-2025-52054
5.3

This vulnerability allows unauthenticated attackers to calculate the root password of Tenda AC8 routers using a static algorithm based on the device's...

Aug 28, 2025
CVE-2025-9100
5.3

This vulnerability allows attackers to bypass authentication in My-Blog 1.0.0 by capturing and replaying authentication data. It affects all users run...

Aug 18, 2025
CVE-2025-8964
5.3

CVE-2025-8964 is an improper authentication vulnerability in code-projects Hostel Management System 1.0 that allows attackers to bypass login controls...

Aug 14, 2025
CVE-2025-8546
5.3

This vulnerability allows attackers to guess CAPTCHA codes in the pybbs admin login page, potentially enabling brute-force attacks against administrat...

Aug 5, 2025
CVE-2025-5876
5.3

This vulnerability allows remote attackers to bypass authentication on Lucky Technology LM-520 series devices. Affected systems include LM-520-SC, LM-...

Jun 9, 2025
CVE-2025-5872
5.3

CVE-2025-5872 is an authentication bypass vulnerability in eGauge EG3000 Energy Monitor's Setting Handler component. Attackers can remotely access set...

Jun 9, 2025
CVE-2025-5437
5.3

This critical vulnerability in Multilaser Sirius RE016 routers allows attackers to bypass authentication on the password change handler remotely. Atta...

Jun 2, 2025
CVE-2025-4268
5.3

This vulnerability allows unauthenticated remote attackers to reboot TOTOLINK A720R routers by accessing the /cgi-bin/cstecgi.cgi endpoint with a spec...

May 5, 2025
CVE-2025-4015
5.3

This CVE describes an authentication bypass vulnerability in Novel-Plus software that allows unauthenticated attackers to access session management fu...

Apr 28, 2025
CVE-2025-2771
5.3

This vulnerability allows remote attackers to bypass authentication on BEC Technologies routers without credentials. Attackers can access the web-base...

Apr 23, 2025
CVE-2025-22232
5.3

Spring Cloud Config Server may ignore client-provided Vault tokens via X-CONFIG-TOKEN header, causing it to persistently use the first token retrieved...

Apr 10, 2025
CVE-2025-3268
5.3

This vulnerability allows remote attackers to bypass authentication mechanisms in TinyWebServer by manipulating the m_url_real argument in http/http_c...

Apr 4, 2025
CVE-2025-2344
5.3

This critical vulnerability in IROAD Dash Cam X5 and X6 allows remote attackers to access video footage and live streams without authentication due to...

Mar 16, 2025
CVE-2025-2339
5.3

CVE-2025-2339 is an improper authentication vulnerability in otale Tale Blog 2.0.5 that allows remote attackers to bypass authentication mechanisms an...

Mar 16, 2025
CVE-2024-27137
5.3

This vulnerability allows a local attacker to perform a man-in-the-middle attack on Apache Cassandra's RMI registry, capturing JMX interface credentia...

Feb 4, 2025
CVE-2024-10620
5.3

CVE-2024-10620 is an improper authentication vulnerability in knightliao Disconf's Configuration Center API endpoint (/api/config/list) that allows re...

Nov 1, 2024
CVE-2024-44202
5.3

This vulnerability allows unauthorized access to Private Browsing tabs in Apple's Safari browser without proper authentication. It affects iOS and iPa...

Sep 17, 2024

About Improper Authentication (CWE-287)

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Our database tracks 790 CVEs classified as CWE-287, with 349 rated critical and 325 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.4.

External reference: View CWE-287 on MITRE CWE →

Monitor Improper Authentication Vulnerabilities

Get alerted when new Improper Authentication CVEs affect your infrastructure.

Start Monitoring Free