CWE-287: Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

822
Total CVEs
371
Critical
334
High
8.4
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
69
2025
217
2024
134
2023
115
2022
70

Top Affected Vendors

1 Apache 15
2 Huawei 13
3 Qualcomm 13
4 Debian 11
5 Dlink 11
6 Cisco 11
7 Microsoft 11
8 Netgear 9
9 Google 9
10 Fedoraproject 9

All Improper Authentication CVEs (822)

CVE-2025-62398
5.4

This authentication bypass vulnerability allows attackers with valid credentials to circumvent multi-factor authentication under specific conditions, ...

Oct 23, 2025
CVE-2025-10224
5.4

This vulnerability in AxxonSoft Axxon One (C-Werk) allows authenticated remote attackers to bypass proper LDAP group membership evaluation during logi...

Sep 10, 2025
CVE-2024-38426
5.4

This vulnerability in Qualcomm UE (User Equipment) authentication processing allows improper authentication that could lead to information disclosure....

Mar 3, 2025
CVE-2025-0604
5.4

This vulnerability allows Active Directory users with expired or disabled accounts to bypass AD restrictions and regain access in Keycloak. It affects...

Jan 22, 2025
CVE-2024-13309
5.4

This vulnerability in Drupal's Login Disable module allows attackers to bypass authentication controls when the module is incorrectly configured. It a...

Jan 9, 2025
CVE-2024-11671
5.4

This vulnerability allows authenticated users in Devolutions Remote Desktop Manager to bypass multi-factor authentication (MFA) by switching data sour...

Nov 25, 2024
CVE-2024-40648
5.4

A vulnerability in matrix-rust-sdk's matrix-sdk-crypto crate allows a malicious homeserver to manipulate the UserIdentity::is_verified() method to inc...

Jul 18, 2024
CVE-2024-38351
5.4

This vulnerability in PocketBase allows account takeover when both OAuth2 and password authentication are enabled. A malicious user can register with ...

Jun 18, 2024
CVE-2025-7630
5.3

This vulnerability allows attackers to perform password brute-forcing attacks against Wispotter systems due to improper restriction of authentication ...

Feb 18, 2026
CVE-2023-52210
5.3

This vulnerability allows attackers to bypass intended access controls in the Product Delivery Date for WooCommerce Lite plugin. Attackers can perform...

Dec 23, 2025
CVE-2025-14703
5.3

This vulnerability allows remote attackers to bypass authentication in Shiguangwu sgwbox N3 NAS devices by manipulating the token argument in the POST...

Dec 15, 2025
CVE-2025-14567
5.3

This CVE describes an authentication bypass vulnerability in haxxorsid Stock-Management-System that allows unauthenticated remote attackers to access ...

Dec 12, 2025
CVE-2025-11852
5.3

This vulnerability allows remote attackers to access the ONVIF service on Apeman ID71 cameras without authentication. Attackers can potentially manipu...

Oct 16, 2025
CVE-2025-10288
5.3

This CVE describes an improper authentication vulnerability in roncoo-pay's /user/info/list endpoint, allowing remote attackers to bypass authenticati...

Sep 12, 2025
CVE-2023-21466
5.3

This CVE describes a PendingIntent hijacking vulnerability in Samsung's CertificatePolicy framework component that allows local attackers to bypass co...

Sep 3, 2025
CVE-2025-52054
5.3

This vulnerability allows unauthenticated attackers to calculate the root password of Tenda AC8 routers using a static algorithm based on the device's...

Aug 28, 2025
CVE-2025-9100
5.3

This vulnerability allows attackers to bypass authentication in My-Blog 1.0.0 by capturing and replaying authentication data. It affects all users run...

Aug 18, 2025
CVE-2025-8964
5.3

CVE-2025-8964 is an improper authentication vulnerability in code-projects Hostel Management System 1.0 that allows attackers to bypass login controls...

Aug 14, 2025
CVE-2025-8546
5.3

This vulnerability allows attackers to guess CAPTCHA codes in the pybbs admin login page, potentially enabling brute-force attacks against administrat...

Aug 5, 2025
CVE-2025-5876
5.3

This vulnerability allows remote attackers to bypass authentication on Lucky Technology LM-520 series devices. Affected systems include LM-520-SC, LM-...

Jun 9, 2025
CVE-2025-5872
5.3

CVE-2025-5872 is an authentication bypass vulnerability in eGauge EG3000 Energy Monitor's Setting Handler component. Attackers can remotely access set...

Jun 9, 2025
CVE-2025-5437
5.3

This critical vulnerability in Multilaser Sirius RE016 routers allows attackers to bypass authentication on the password change handler remotely. Atta...

Jun 2, 2025
CVE-2025-4268
5.3

This vulnerability allows unauthenticated remote attackers to reboot TOTOLINK A720R routers by accessing the /cgi-bin/cstecgi.cgi endpoint with a spec...

May 5, 2025
CVE-2025-4015
5.3

This CVE describes an authentication bypass vulnerability in Novel-Plus software that allows unauthenticated attackers to access session management fu...

Apr 28, 2025
CVE-2025-2771
5.3

This vulnerability allows remote attackers to bypass authentication on BEC Technologies routers without credentials. Attackers can access the web-base...

Apr 23, 2025
CVE-2025-22232
5.3

Spring Cloud Config Server may ignore client-provided Vault tokens via X-CONFIG-TOKEN header, causing it to persistently use the first token retrieved...

Apr 10, 2025
CVE-2025-3268
5.3

This vulnerability allows remote attackers to bypass authentication mechanisms in TinyWebServer by manipulating the m_url_real argument in http/http_c...

Apr 4, 2025
CVE-2025-2344
5.3

This critical vulnerability in IROAD Dash Cam X5 and X6 allows remote attackers to access video footage and live streams without authentication due to...

Mar 16, 2025
CVE-2025-2339
5.3

CVE-2025-2339 is an improper authentication vulnerability in otale Tale Blog 2.0.5 that allows remote attackers to bypass authentication mechanisms an...

Mar 16, 2025
CVE-2024-27137
5.3

This vulnerability allows a local attacker to perform a man-in-the-middle attack on Apache Cassandra's RMI registry, capturing JMX interface credentia...

Feb 4, 2025
CVE-2024-10620
5.3

CVE-2024-10620 is an improper authentication vulnerability in knightliao Disconf's Configuration Center API endpoint (/api/config/list) that allows re...

Nov 1, 2024
CVE-2024-44202
5.3

This vulnerability allows unauthorized access to Private Browsing tabs in Apple's Safari browser without proper authentication. It affects iOS and iPa...

Sep 17, 2024
CVE-2024-44127
5.3

This vulnerability allows unauthorized access to Private Browsing tabs in iOS/iPadOS without proper authentication. It affects users running vulnerabl...

Sep 17, 2024
CVE-2024-20890
5.3

This vulnerability in Samsung devices' Bluetooth Low Energy (BLE) stack allows nearby attackers to send malformed BLE packets that trigger abnormal be...

Jul 2, 2024
CVE-2024-34093
5.3

This vulnerability in Archer Platform 6 allows unauthenticated attackers to bypass IP whitelisting controls when the X-Forwarded-For header is enabled...

May 6, 2024
CVE-2025-25450
5.1

This vulnerability allows remote attackers to bypass two-factor authentication (2FA) in MyTaag software by deactivating the second factor via the /ses...

Mar 6, 2025
CVE-2025-25452
5.1

This vulnerability allows remote attackers to bypass two-factor authentication and deactivate it in MyTaag systems, enabling privilege escalation. It ...

Mar 6, 2025
CVE-2025-1024
4.8

A reflected cross-site scripting (XSS) vulnerability in ChurchCRM 5.13.0 allows authenticated administrators to inject malicious JavaScript via the EI...

Feb 19, 2025
CVE-2025-64434
4.7

This vulnerability in KubeVirt allows an attacker who compromises a virt-handler instance to impersonate virt-api using shared credentials, enabling p...

Nov 7, 2025
CVE-2025-64432
4.7

This vulnerability in KubeVirt allows attackers to bypass RBAC controls by exploiting a flawed mTLS authentication implementation in the virt-api comp...

Nov 7, 2025
CVE-2025-59704
4.6

This vulnerability allows physical attackers to access the BIOS menu on affected Entrust hardware security modules (HSMs) because the BIOS lacks passw...

Dec 2, 2025
CVE-2023-21467
4.6

This vulnerability in Samsung Exynos baseband chips allows incorrect handling of unencrypted messages due to a 3GPP specification implementation error...

Sep 3, 2025
CVE-2024-23251
4.6

An authentication vulnerability in Apple's Mail application allows attackers with physical access to a device to potentially extract Mail account cred...

Jun 10, 2024
CVE-2026-3194
4.5

This vulnerability allows local attackers to bypass authentication in Chia Blockchain's RPC server master passphrase handler, potentially accessing pr...

Feb 25, 2026
CVE-2025-64517
4.4

sudo-rs versions 0.2.5 through 0.2.9 have an authentication bypass vulnerability when using targetpw or rootpw options. The bug incorrectly records th...

Nov 12, 2025
CVE-2026-24241
4.3

NVIDIA Delegated Licensing Service contains an improper authentication vulnerability (CWE-287) that could allow an attacker to bypass authentication m...

Feb 24, 2026
CVE-2026-22764
4.3

Dell OpenManage Network Integration versions before 3.9 have an improper authentication vulnerability that allows low-privileged remote attackers to a...

Jan 29, 2026
CVE-2025-14746
4.3

This vulnerability allows unauthenticated access to the RTSP live video stream endpoint in Ningyuanda TC155 version 57.0.2.0. Attackers on the same lo...

Dec 16, 2025
CVE-2025-10684
4.3

The Construction Light WordPress theme before version 1.6.8 lacks proper authorization and CSRF protection in an AJAX activation function. This allows...

Dec 12, 2025
CVE-2025-54573
4.3

CVAT versions 1.1.0 through 2.41.0 do not enforce email verification when using Basic HTTP Authentication, allowing attackers to create accounts with ...

Jul 30, 2025

About Improper Authentication (CWE-287)

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Our database tracks 822 CVEs classified as CWE-287, with 371 rated critical and 334 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.4.

External reference: View CWE-287 on MITRE CWE →

Monitor Improper Authentication Vulnerabilities

Get alerted when new Improper Authentication CVEs affect your infrastructure.

Start Monitoring Free