CWE-287: Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Yearly Trend
Top Affected Vendors
All Improper Authentication CVEs (822)
This authentication bypass vulnerability allows attackers with valid credentials to circumvent multi-factor authentication under specific conditions, ...
Oct 23, 2025This vulnerability in AxxonSoft Axxon One (C-Werk) allows authenticated remote attackers to bypass proper LDAP group membership evaluation during logi...
Sep 10, 2025This vulnerability in Qualcomm UE (User Equipment) authentication processing allows improper authentication that could lead to information disclosure....
Mar 3, 2025This vulnerability allows Active Directory users with expired or disabled accounts to bypass AD restrictions and regain access in Keycloak. It affects...
Jan 22, 2025This vulnerability in Drupal's Login Disable module allows attackers to bypass authentication controls when the module is incorrectly configured. It a...
Jan 9, 2025This vulnerability allows authenticated users in Devolutions Remote Desktop Manager to bypass multi-factor authentication (MFA) by switching data sour...
Nov 25, 2024A vulnerability in matrix-rust-sdk's matrix-sdk-crypto crate allows a malicious homeserver to manipulate the UserIdentity::is_verified() method to inc...
Jul 18, 2024This vulnerability in PocketBase allows account takeover when both OAuth2 and password authentication are enabled. A malicious user can register with ...
Jun 18, 2024This vulnerability allows attackers to perform password brute-forcing attacks against Wispotter systems due to improper restriction of authentication ...
Feb 18, 2026This vulnerability allows attackers to bypass intended access controls in the Product Delivery Date for WooCommerce Lite plugin. Attackers can perform...
Dec 23, 2025This vulnerability allows remote attackers to bypass authentication in Shiguangwu sgwbox N3 NAS devices by manipulating the token argument in the POST...
Dec 15, 2025This CVE describes an authentication bypass vulnerability in haxxorsid Stock-Management-System that allows unauthenticated remote attackers to access ...
Dec 12, 2025This vulnerability allows remote attackers to access the ONVIF service on Apeman ID71 cameras without authentication. Attackers can potentially manipu...
Oct 16, 2025This CVE describes an improper authentication vulnerability in roncoo-pay's /user/info/list endpoint, allowing remote attackers to bypass authenticati...
Sep 12, 2025This CVE describes a PendingIntent hijacking vulnerability in Samsung's CertificatePolicy framework component that allows local attackers to bypass co...
Sep 3, 2025This vulnerability allows unauthenticated attackers to calculate the root password of Tenda AC8 routers using a static algorithm based on the device's...
Aug 28, 2025This vulnerability allows attackers to bypass authentication in My-Blog 1.0.0 by capturing and replaying authentication data. It affects all users run...
Aug 18, 2025CVE-2025-8964 is an improper authentication vulnerability in code-projects Hostel Management System 1.0 that allows attackers to bypass login controls...
Aug 14, 2025This vulnerability allows attackers to guess CAPTCHA codes in the pybbs admin login page, potentially enabling brute-force attacks against administrat...
Aug 5, 2025This vulnerability allows remote attackers to bypass authentication on Lucky Technology LM-520 series devices. Affected systems include LM-520-SC, LM-...
Jun 9, 2025CVE-2025-5872 is an authentication bypass vulnerability in eGauge EG3000 Energy Monitor's Setting Handler component. Attackers can remotely access set...
Jun 9, 2025This critical vulnerability in Multilaser Sirius RE016 routers allows attackers to bypass authentication on the password change handler remotely. Atta...
Jun 2, 2025This vulnerability allows unauthenticated remote attackers to reboot TOTOLINK A720R routers by accessing the /cgi-bin/cstecgi.cgi endpoint with a spec...
May 5, 2025This CVE describes an authentication bypass vulnerability in Novel-Plus software that allows unauthenticated attackers to access session management fu...
Apr 28, 2025This vulnerability allows remote attackers to bypass authentication on BEC Technologies routers without credentials. Attackers can access the web-base...
Apr 23, 2025Spring Cloud Config Server may ignore client-provided Vault tokens via X-CONFIG-TOKEN header, causing it to persistently use the first token retrieved...
Apr 10, 2025This vulnerability allows remote attackers to bypass authentication mechanisms in TinyWebServer by manipulating the m_url_real argument in http/http_c...
Apr 4, 2025This critical vulnerability in IROAD Dash Cam X5 and X6 allows remote attackers to access video footage and live streams without authentication due to...
Mar 16, 2025CVE-2025-2339 is an improper authentication vulnerability in otale Tale Blog 2.0.5 that allows remote attackers to bypass authentication mechanisms an...
Mar 16, 2025This vulnerability allows a local attacker to perform a man-in-the-middle attack on Apache Cassandra's RMI registry, capturing JMX interface credentia...
Feb 4, 2025CVE-2024-10620 is an improper authentication vulnerability in knightliao Disconf's Configuration Center API endpoint (/api/config/list) that allows re...
Nov 1, 2024This vulnerability allows unauthorized access to Private Browsing tabs in Apple's Safari browser without proper authentication. It affects iOS and iPa...
Sep 17, 2024This vulnerability allows unauthorized access to Private Browsing tabs in iOS/iPadOS without proper authentication. It affects users running vulnerabl...
Sep 17, 2024This vulnerability in Samsung devices' Bluetooth Low Energy (BLE) stack allows nearby attackers to send malformed BLE packets that trigger abnormal be...
Jul 2, 2024This vulnerability in Archer Platform 6 allows unauthenticated attackers to bypass IP whitelisting controls when the X-Forwarded-For header is enabled...
May 6, 2024This vulnerability allows remote attackers to bypass two-factor authentication (2FA) in MyTaag software by deactivating the second factor via the /ses...
Mar 6, 2025This vulnerability allows remote attackers to bypass two-factor authentication and deactivate it in MyTaag systems, enabling privilege escalation. It ...
Mar 6, 2025A reflected cross-site scripting (XSS) vulnerability in ChurchCRM 5.13.0 allows authenticated administrators to inject malicious JavaScript via the EI...
Feb 19, 2025This vulnerability in KubeVirt allows an attacker who compromises a virt-handler instance to impersonate virt-api using shared credentials, enabling p...
Nov 7, 2025This vulnerability in KubeVirt allows attackers to bypass RBAC controls by exploiting a flawed mTLS authentication implementation in the virt-api comp...
Nov 7, 2025This vulnerability allows physical attackers to access the BIOS menu on affected Entrust hardware security modules (HSMs) because the BIOS lacks passw...
Dec 2, 2025This vulnerability in Samsung Exynos baseband chips allows incorrect handling of unencrypted messages due to a 3GPP specification implementation error...
Sep 3, 2025An authentication vulnerability in Apple's Mail application allows attackers with physical access to a device to potentially extract Mail account cred...
Jun 10, 2024This vulnerability allows local attackers to bypass authentication in Chia Blockchain's RPC server master passphrase handler, potentially accessing pr...
Feb 25, 2026sudo-rs versions 0.2.5 through 0.2.9 have an authentication bypass vulnerability when using targetpw or rootpw options. The bug incorrectly records th...
Nov 12, 2025NVIDIA Delegated Licensing Service contains an improper authentication vulnerability (CWE-287) that could allow an attacker to bypass authentication m...
Feb 24, 2026Dell OpenManage Network Integration versions before 3.9 have an improper authentication vulnerability that allows low-privileged remote attackers to a...
Jan 29, 2026This vulnerability allows unauthenticated access to the RTSP live video stream endpoint in Ningyuanda TC155 version 57.0.2.0. Attackers on the same lo...
Dec 16, 2025The Construction Light WordPress theme before version 1.6.8 lacks proper authorization and CSRF protection in an AJAX activation function. This allows...
Dec 12, 2025CVAT versions 1.1.0 through 2.41.0 do not enforce email verification when using Basic HTTP Authentication, allowing attackers to create accounts with ...
Jul 30, 2025About Improper Authentication (CWE-287)
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Our database tracks 822 CVEs classified as CWE-287, with 371 rated critical and 334 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.4.
External reference: View CWE-287 on MITRE CWE →
Monitor Improper Authentication Vulnerabilities
Get alerted when new Improper Authentication CVEs affect your infrastructure.
Start Monitoring Free