CWE-287: Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Yearly Trend
Top Affected Vendors
All Improper Authentication CVEs (738)
The RingCentral Communications plugin for WordPress versions 1.5 to 1.6.8 contains an authentication bypass vulnerability in the ringcentral_admin_log...
Aug 28, 2025MallChat v1.0-SNAPSHOT has an authentication bypass vulnerability that allows attackers to access APIs without any authentication token. This affects ...
Aug 22, 2025CVE-2024-50644 is an authentication bypass vulnerability in zhisheng17 blog version 3.0.1-SNAPSHOT that allows attackers to access APIs without valid ...
Aug 22, 2025This vulnerability allows remote attackers to execute arbitrary code on systems running Roadcute API v.1 by exploiting a password reset endpoint that ...
Aug 21, 2025This vulnerability allows attackers to bypass authentication on Chavara Matrimony Site v2.0 by exploiting a flaw in the OTP mechanism. Attackers can g...
Jul 25, 2025This vulnerability allows attackers to reroute authentication requests from Secrets Manager to malicious servers when network devices are misconfigure...
Jul 15, 2025This authentication bypass vulnerability in Nexxt Solutions NCM-X1800 Mesh Router firmware allows attackers to remotely enable Telnet service without ...
Jul 15, 2025COROS PACE 3 smartwatches through firmware version 3.0808.0 incorrectly identify themselves as devices without input/output capabilities, forcing Blue...
Jun 20, 2025This CVE describes a permission vulnerability in the BoomPlayer mobile application that allows unauthorized operations. Attackers could potentially by...
Jun 16, 2025CVE-2025-49001 is a critical authentication bypass vulnerability in DataEase where JWT token secret verification fails, allowing attackers to forge va...
Jun 3, 2025This vulnerability in Ocuco Innovation's INNOVASERVICEINTF.EXE allows attackers to bypass authentication and gain Administrator privileges by sending ...
May 22, 2025This vulnerability in Ocuco Innovation's INVCLIENT.EXE allows attackers to bypass authentication and gain Administrator privileges by sending a specia...
May 22, 2025This vulnerability allows remote attackers to bypass administrator login authentication on D-Link DI-8100 routers. Attackers can gain administrative a...
May 21, 2025This vulnerability allows remote attackers to bypass authentication on Netgear DGND3700 routers via manipulation of the /BRS_top.html file. Attackers ...
May 20, 2025The Jenkins WSO2 Oauth Plugin 1.0 and earlier contains an authentication bypass vulnerability where the plugin accepts authentication claims without v...
May 14, 2025This vulnerability allows attackers to bypass PKCE (Proof Key for Code Exchange) protection in the workers-oauth-provider component of Cloudflare's MC...
May 1, 2025This vulnerability allows password autofill to incorrectly populate passwords even after authentication fails, potentially exposing credentials. It af...
Mar 31, 2025CVE-2024-13804 is an unauthenticated remote code execution vulnerability in HPE Insight Cluster Management Utility. Attackers can execute arbitrary co...
Mar 30, 2025This vulnerability allows attackers with network access to intercept traffic and steal user session cookies, enabling session hijacking. Attackers can...
Mar 28, 2025This vulnerability allows unauthenticated attackers to reset any user's password without verifying the old password, including admin accounts. It affe...
Mar 27, 2025This vulnerability allows attackers to bypass authentication in DataEase, potentially gaining unauthorized access to sensitive business intelligence d...
Mar 13, 2025This vulnerability affects SINAMICS S200 industrial drives with specific serial numbers, allowing attackers to exploit an unlocked bootloader to injec...
Mar 11, 2025The WPCOM Member WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to log in as any existing user, inc...
Mar 7, 2025This vulnerability allows attackers to bypass OAuth authentication in Vasion Print (formerly PrinterLogic) systems, potentially gaining unauthorized a...
Mar 5, 2025This critical vulnerability in D-Link DIR-859 routers allows attackers to bypass authentication by forging POST requests to the /getcfg.php page, pote...
Feb 18, 2025This vulnerability allows attackers to bypass authentication on TP-Link Archer C20 routers by adding a specific Referer header to requests targeting i...
Feb 18, 2025This critical authentication bypass vulnerability allows remote attackers to completely bypass authentication on Logsign Unified SecOps Platform insta...
Feb 11, 2025A critical authentication bypass vulnerability in compop.ca ONLINE MALL v3.5.3 allows remote attackers to execute arbitrary code by manipulating rid, ...
Feb 4, 2025This vulnerability involves insecure default credentials for the Telnet function in Zyxel VMG4325-B10A DSL CPE devices. Attackers can log into the man...
Feb 4, 2025CVE-2025-0637 is an improper authentication vulnerability in Beta10 software that allows unauthenticated attackers to access restricted areas and perf...
Jan 23, 2025This vulnerability allows unauthenticated attackers to bypass authentication in the Paid Membership Subscriptions WordPress plugin by using a known pa...
Jan 14, 2025This vulnerability allows unauthenticated attackers to create administrative user accounts on WordPress sites using the PayU CommercePro Plugin. All W...
Jan 7, 2025The Biagiotti Membership plugin for WordPress has an authentication bypass vulnerability that allows unauthenticated attackers to log in as any user, ...
Dec 18, 2024The Sign In With Google WordPress plugin up to version 1.8.0 contains an authentication bypass vulnerability due to insufficient null value checks in ...
Dec 12, 2024Cobbler versions 3.0.0 through 3.2.2 and 3.3.0 through 3.3.6 have an authentication bypass vulnerability where the get_shared_secret() function always...
Nov 18, 2024WhatsUp Gold versions before 2024.0.0 contain an authentication bypass vulnerability that allows attackers to obtain encrypted user credentials withou...
Oct 24, 2024This CVE describes an authentication bypass vulnerability in Apache Solr's PKIAuthenticationPlugin. Attackers can bypass authentication by appending a...
Oct 16, 2024The Ultimate Membership Pro WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to log in as any user, i...
Oct 16, 2024CVE-2024-45115 is an improper authentication vulnerability in Adobe Commerce that allows attackers to bypass authentication mechanisms and gain elevat...
Oct 10, 2024This vulnerability allows attackers to bypass the weak 4-digit PIN protection on SENTRON 7KM PAC3200 devices via Modbus TCP interface. Attackers can b...
Oct 8, 2024CVE-2024-47218 is an authentication bypass vulnerability in vesoft NebulaGraph that allows attackers to access the system without valid credentials. T...
Sep 22, 2024CVE-2024-34399 is a critical authentication bypass vulnerability in BMC Remedy Mid Tier 7.6.04 that allows unauthenticated remote attackers to access ...
Sep 18, 2024Loftware Spectrum versions before 4.6 HF14 have a critical authentication bypass vulnerability that allows unauthenticated attackers to execute privil...
Sep 10, 2024An authentication bypass vulnerability in Foreman with External Authentication allows attackers to gain administrative access by exploiting Apache mod...
Sep 4, 2024An authentication bypass vulnerability in Flowise version 1.8.2 allows remote unauthenticated attackers to access administrator API endpoints and rest...
Aug 27, 2024This vulnerability allows remote unauthenticated attackers to bypass authentication on Ivanti vTM admin panels. Attackers can gain administrative acce...
Aug 13, 2024This vulnerability allows an unauthorized attacker on the same network to bypass authentication in Ivanti EPMM's web component and execute arbitrary c...
Aug 7, 2024CVE-2024-22442 is an authentication bypass vulnerability in HPE products that allows remote attackers to gain unauthorized access without valid creden...
Jul 16, 2024The InstaWP Connect WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to log in as any existing user, ...
Jul 11, 2024This vulnerability allows attackers who have already compromised access to a Devolutions Remote Desktop Manager instance to bypass the vault master pa...
Jun 17, 2024About Improper Authentication (CWE-287)
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Our database tracks 738 CVEs classified as CWE-287, with 324 rated critical and 298 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.3.
External reference: View CWE-287 on MITRE CWE →
Monitor Improper Authentication Vulnerabilities
Get alerted when new Improper Authentication CVEs affect your infrastructure.
Start Monitoring Free