CWE-287: Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Yearly Trend
Top Affected Vendors
All Improper Authentication CVEs (828)
sudo-rs versions 0.2.5 through 0.2.9 have an authentication bypass vulnerability when using targetpw or rootpw options. The bug incorrectly records th...
Nov 12, 2025NVIDIA Delegated Licensing Service contains an improper authentication vulnerability (CWE-287) that could allow an attacker to bypass authentication m...
Feb 24, 2026Dell OpenManage Network Integration versions before 3.9 have an improper authentication vulnerability that allows low-privileged remote attackers to a...
Jan 29, 2026This vulnerability allows unauthenticated access to the RTSP live video stream endpoint in Ningyuanda TC155 version 57.0.2.0. Attackers on the same lo...
Dec 16, 2025The Construction Light WordPress theme before version 1.6.8 lacks proper authorization and CSRF protection in an AJAX activation function. This allows...
Dec 12, 2025CVAT versions 1.1.0 through 2.41.0 do not enforce email verification when using Basic HTTP Authentication, allowing attackers to create accounts with ...
Jul 30, 2025This vulnerability allows unauthenticated access to live video streams from 70mai M300 dash cameras. Attackers on the same local network can view real...
Jun 23, 2025A syntax error in ExtremeCloud Universal ZTNA's 'searchKeyword' condition allows users to bypass the owner_id filter, potentially enabling them to sea...
Jun 13, 2025A Moodle vulnerability allows some users to access sensitive student information before identity verification via 2FA is completed. This affects Moodl...
Apr 25, 2025This vulnerability in Firefox for iOS allows QR codes containing website URLs to open those URLs automatically without user confirmation. It affects F...
Mar 4, 2025This CVE describes an instruction authentication bypass vulnerability in Huawei's Findnetwork module that allows attackers to bypass authentication me...
Jan 8, 2025CVE-2023-45038 is an improper authentication vulnerability in QNAP Music Station that could allow attackers to bypass authentication mechanisms. This ...
Sep 6, 2024This CVE describes an improper authentication vulnerability in the Play.Ht WordPress plugin that allows attackers to bypass access controls and access...
Jun 24, 2024This vulnerability allows physical attackers to bypass authentication and access Samsung Secure Folder in specific scenarios. It affects Samsung devic...
May 7, 2024Mattermost mobile apps up to version 2.16.0 fail to properly validate push notification origins, allowing malicious servers to impersonate legitimate ...
Jul 15, 2024This vulnerability in Samsung's SemClipboard service allows attackers to bypass access controls and read arbitrary files with system-level permissions...
Sep 3, 2025This CVE describes an authentication bypass vulnerability in DJI drone models (Mavic Mini, Air, Spark, Mini SE) through capture-replay attacks on the ...
Feb 2, 2026Curl incorrectly uses SSH agent authentication for SCP/SFTP transfers even when explicitly configured for public key authentication. This allows attac...
Jan 8, 2026This vulnerability in Nextcloud Approval app allows authenticated users listed as requesters in workflows to mark other users' files as 'pending appro...
Dec 5, 2025Orthanc versions before 1.12.10 have an authorization logic flaw in HTTP Basic Authentication that allows privilege escalation. Attackers can exploit ...
Feb 18, 2026This authentication bypass vulnerability in VIGI camera models allows attackers on the same local network to reset the admin password without verifica...
Jan 16, 2026CVE-2025-67859 is an improper authentication vulnerability in TLP (a power management tool for Linux) that allows local users to bypass polkit authent...
Jan 14, 2026This vulnerability in wolfssl-py allows attackers to bypass mutual TLS (mTLS) client authentication by omitting client certificates during TLS handsha...
Jan 8, 2026An authentication bypass vulnerability in Google Cloud Dialogflow CX Messenger allows unauthenticated users to interact with restricted chat agents. T...
Dec 18, 2025This CVE describes an improper authentication vulnerability in the TYPO3 extension 'Modules' (codingms/modules). It allows attackers to bypass authent...
Nov 12, 2025An authentication bypass vulnerability in Milvus Proxy allows unauthenticated attackers to gain full administrative access to Milvus clusters. This en...
Nov 10, 2025An incorrect authentication vulnerability in OpenSIAC could allow attackers to impersonate legitimate users who authenticate via Spain's Cl@ve system....
Oct 2, 2025This CVE describes an authentication bypass vulnerability in Fedify, a TypeScript library for ActivityPub federated servers. It allows unauthenticated...
Aug 9, 2025About Improper Authentication (CWE-287)
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Our database tracks 828 CVEs classified as CWE-287, with 373 rated critical and 338 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.4.
External reference: View CWE-287 on MITRE CWE →
Monitor Improper Authentication Vulnerabilities
Get alerted when new Improper Authentication CVEs affect your infrastructure.
Start Monitoring Free