CWE-287: Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

828
Total CVEs
373
Critical
338
High
8.4
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
69
2025
217
2024
134
2023
115
2022
70

Top Affected Vendors

1 Apache 15
2 Huawei 13
3 Qualcomm 13
4 Debian 11
5 Dlink 11
6 Cisco 11
7 Microsoft 11
8 Netgear 9
9 Google 9
10 Fedoraproject 9

All Improper Authentication CVEs (828)

CVE-2025-64517
4.4

sudo-rs versions 0.2.5 through 0.2.9 have an authentication bypass vulnerability when using targetpw or rootpw options. The bug incorrectly records th...

Nov 12, 2025
CVE-2026-24241
4.3

NVIDIA Delegated Licensing Service contains an improper authentication vulnerability (CWE-287) that could allow an attacker to bypass authentication m...

Feb 24, 2026
CVE-2026-22764
4.3

Dell OpenManage Network Integration versions before 3.9 have an improper authentication vulnerability that allows low-privileged remote attackers to a...

Jan 29, 2026
CVE-2025-14746
4.3

This vulnerability allows unauthenticated access to the RTSP live video stream endpoint in Ningyuanda TC155 version 57.0.2.0. Attackers on the same lo...

Dec 16, 2025
CVE-2025-10684
4.3

The Construction Light WordPress theme before version 1.6.8 lacks proper authorization and CSRF protection in an AJAX activation function. This allows...

Dec 12, 2025
CVE-2025-54573
4.3

CVAT versions 1.1.0 through 2.41.0 do not enforce email verification when using Basic HTTP Authentication, allowing attackers to create accounts with ...

Jul 30, 2025
CVE-2025-6528
4.3

This vulnerability allows unauthenticated access to live video streams from 70mai M300 dash cameras. Attackers on the same local network can view real...

Jun 23, 2025
CVE-2025-6083
4.3

A syntax error in ExtremeCloud Universal ZTNA's 'searchKeyword' condition allows users to bypass the owner_id filter, potentially enabling them to sea...

Jun 13, 2025
CVE-2025-3627
4.3

A Moodle vulnerability allows some users to access sensitive student information before identity verification via 2FA is completed. This affects Moodl...

Apr 25, 2025
CVE-2025-27425
4.3

This vulnerability in Firefox for iOS allows QR codes containing website URLs to open those URLs automatically without user confirmation. It affects F...

Mar 4, 2025
CVE-2024-56445
4.3

This CVE describes an instruction authentication bypass vulnerability in Huawei's Findnetwork module that allows attackers to bypass authentication me...

Jan 8, 2025
CVE-2023-45038
4.3

CVE-2023-45038 is an improper authentication vulnerability in QNAP Music Station that could allow attackers to bypass authentication mechanisms. This ...

Sep 6, 2024
CVE-2024-37233
4.3

This CVE describes an improper authentication vulnerability in the Play.Ht WordPress plugin that allows attackers to bypass access controls and access...

Jun 24, 2024
CVE-2024-20856
4.3

This vulnerability allows physical attackers to bypass authentication and access Samsung Secure Folder in specific scenarios. It affects Samsung devic...

May 7, 2024
CVE-2024-39767
4.2

Mattermost mobile apps up to version 2.16.0 fail to properly validate push notification origins, allowing malicious servers to impersonate legitimate ...

Jul 15, 2024
CVE-2023-21471
4.0

This vulnerability in Samsung's SemClipboard service allows attackers to bypass access controls and read arbitrary files with system-level permissions...

Sep 3, 2025
CVE-2026-1743
3.1

This CVE describes an authentication bypass vulnerability in DJI drone models (Mavic Mini, Air, Spark, Mini SE) through capture-replay attacks on the ...

Feb 2, 2026
CVE-2025-15224
3.1

Curl incorrectly uses SSH agent authentication for SCP/SFTP transfers even when explicitly configured for public key authentication. This allows attac...

Jan 8, 2026
CVE-2025-66515
2.7

This vulnerability in Nextcloud Approval app allows authenticated users listed as requesters in workflows to mark other users' files as 'pending appro...

Dec 5, 2025
CVE-2025-15581
N/A

Orthanc versions before 1.12.10 have an authorization logic flaw in HTTP Basic Authentication that allows privilege escalation. Attackers can exploit ...

Feb 18, 2026
CVE-2026-0629
N/A

This authentication bypass vulnerability in VIGI camera models allows attackers on the same local network to reset the admin password without verifica...

Jan 16, 2026
CVE-2025-67859
N/A

CVE-2025-67859 is an improper authentication vulnerability in TLP (a power management tool for Linux) that allows local users to bypass polkit authent...

Jan 14, 2026
CVE-2025-15346
N/A

This vulnerability in wolfssl-py allows attackers to bypass mutual TLS (mTLS) client authentication by omitting client certificates during TLS handsha...

Jan 8, 2026
CVE-2025-13427
N/A

An authentication bypass vulnerability in Google Cloud Dialogflow CX Messenger allows unauthenticated users to interact with restricted chat agents. T...

Dec 18, 2025
CVE-2025-12998
N/A

This CVE describes an improper authentication vulnerability in the TYPO3 extension 'Modules' (codingms/modules). It allows attackers to bypass authent...

Nov 12, 2025
CVE-2025-64513
N/A

An authentication bypass vulnerability in Milvus Proxy allows unauthenticated attackers to gain full administrative access to Milvus clusters. This en...

Nov 10, 2025
CVE-2025-41064
N/A

An incorrect authentication vulnerability in OpenSIAC could allow attackers to impersonate legitimate users who authenticate via Spain's Cl@ve system....

Oct 2, 2025
CVE-2025-54888
N/A

This CVE describes an authentication bypass vulnerability in Fedify, a TypeScript library for ActivityPub federated servers. It allows unauthenticated...

Aug 9, 2025

About Improper Authentication (CWE-287)

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Our database tracks 828 CVEs classified as CWE-287, with 373 rated critical and 338 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.4.

External reference: View CWE-287 on MITRE CWE →

Monitor Improper Authentication Vulnerabilities

Get alerted when new Improper Authentication CVEs affect your infrastructure.

Start Monitoring Free