CWE-287: Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Yearly Trend
Top Affected Vendors
All Improper Authentication CVEs (758)
This CVE describes multiple authentication bypass vulnerabilities in the WAVLINK WN530H4 router's /cgi-bin/ endpoint. Attackers can access router sett...
Oct 2, 2020CVE-2020-26105 is an authentication bypass vulnerability in cPanel's chkservd service that uses insecure test credentials on templated virtual machine...
Sep 25, 2020This critical vulnerability allows unauthenticated remote attackers to bypass authentication and gain administrative access to Cisco Firepower Managem...
Sep 23, 2020CVE-2020-16098 allows unauthenticated attackers to enumerate access card credentials from Gallagher Command Centre security systems via network connec...
Sep 15, 2020This vulnerability allows remote attackers to execute arbitrary code on Tenda AC18 routers without authentication when the administrator UI is configu...
Sep 4, 2020CVE-2020-24029 allows unauthenticated attackers to change passwords in ForLogic Qualiex v1 and v3 without proper validation, enabling unauthorized acc...
Sep 2, 2020CVE-2020-5777 allows remote attackers to bypass authentication in MAGMI (Magento Mass Importer) by overwhelming database connections and exploiting de...
Sep 1, 2020This vulnerability allows unauthenticated attackers to bypass authentication in multiple Zoho ManageEngine products via a Java servlet. Attackers can ...
Aug 31, 2020This vulnerability allows remote unauthenticated attackers to bypass authentication and send manipulated communication packets to Yokogawa industrial ...
Aug 5, 2020CVE-2020-5616 is an authentication bypass vulnerability in multiple PHP-Factory free edition web applications that allows remote attackers to gain adm...
Aug 4, 2020CVE-2020-3297 allows unauthenticated remote attackers to bypass authentication on Cisco Small Business Smart and Managed Switches by brute-forcing wea...
Jul 2, 2020This vulnerability allows attackers to bypass authentication on affected Hikvision IP cameras and surveillance devices, potentially gaining unauthoriz...
May 6, 2017A signature verification vulnerability in Rapid7 InsightVM's Assertion Consumer Service allows attackers to bypass authentication and gain unauthorize...
Feb 3, 2026CVE-2025-66022 is a critical vulnerability in FACTION PenTesting Report Generation Framework that allows unauthenticated attackers to upload malicious...
Nov 26, 2025This authentication bypass vulnerability in MAAS allows attackers to execute unauthorized RPC commands without proper credentials. Systems running vul...
Jul 21, 2025This vulnerability in authentik allows session hijacking through Remote Access Control (RAC) tokens. An attacker who obtains a RAC token URL (e.g., vi...
Jun 27, 2025This vulnerability allows attackers to bypass authentication in Xiaomi Mi Connect Service APP due to flawed validation logic, enabling unauthorized ac...
Jun 23, 2025This CVE-2025-30215 is an improper access control vulnerability in NATS-Server's JetStream management system. It allows any user with JetStream manage...
Apr 16, 2025This vulnerability allows authenticated users of SolarWinds Access Rights Manager to execute arbitrary code remotely by exploiting improper authentica...
Jul 17, 2024This vulnerability in VMware's deprecated Enhanced Authentication Plug-in (EAP) allows attackers to trick users into relaying authentication requests,...
Feb 20, 2024CVE-2023-28727 is an authentication bypass vulnerability in Panasonic AiSEG2 home energy management systems. Attackers on the same network can bypass ...
Mar 31, 2023CVE-2022-24422 is an improper authentication vulnerability in Dell iDRAC9 that allows remote unauthenticated attackers to bypass authentication and ga...
May 26, 2022This vulnerability allows unauthenticated attackers to send specially crafted POST requests to Digi PortServer TS 16 Rack devices, enabling SNMP servi...
Sep 17, 2021This vulnerability allows unprivileged users to bypass authentication in Arista's Metamako Operating System Web UI under certain conditions. It affect...
Sep 9, 2021This vulnerability allows an attacker who has already compromised a network to take control of UniFi Protect cameras on that network. It affects UniFi...
Aug 31, 2021Dell EMC iDRAC9 versions 4.40.00.00 through 4.40.10.00 contain an improper authentication vulnerability that allows remote unauthenticated attackers t...
Jul 29, 2021This vulnerability allows attackers to bypass email verification requirements in GitLab's OAuth flow, enabling unauthorized account access. It affects...
Aug 10, 2020An authentication bypass vulnerability in Mitel MiVoice MX-ONE Provisioning Manager allows unauthenticated attackers to gain unauthorized access to us...
Jan 15, 2026This vulnerability allows authentication bypass in ZimaOS by exploiting improper password validation for system service accounts. Attackers can gain a...
Jan 8, 2026This vulnerability allows attackers to bypass authentication in Formbricks by forging JWT tokens without signature verification. Attackers who know a ...
Sep 26, 2025This critical authentication bypass vulnerability in Ruijie RG-ES series switches allows remote attackers to gain full administrative control without ...
Sep 3, 2025This vulnerability allows an attacker to impersonate legitimate nodes in a Meshtastic mesh network by manipulating public key assignments. Attackers c...
Aug 18, 2025CVE-2023-6768 is an authentication bypass vulnerability in Amazing Little Poll that allows unauthenticated attackers to access the admin panel without...
Dec 20, 2023This vulnerability allows attackers to bypass image verification in Qualcomm Snapdragon chipsets by exploiting improper validation of ELF metadata in ...
Feb 11, 2022This critical vulnerability in Sentry's SAML SSO implementation allows attackers to take over any user account by exploiting misconfigured multi-organ...
Feb 21, 2026This vulnerability in Antrea's network policy priority assignment system causes incorrect traffic enforcement due to a uint16 arithmetic overflow when...
Feb 6, 2026This critical authentication bypass vulnerability in Kanboard allows attackers to impersonate any user, including administrators, by sending spoofed H...
Jan 8, 2026Emlog Pro 2.5.23 has a session verification code error that allows attackers to reuse email verification codes. This authentication bypass vulnerabili...
Oct 24, 2025A critical authentication bypass vulnerability in PrestaShop Checkout payment module allows attackers to silently log in as any user via email manipul...
Oct 16, 2025An unauthenticated path traversal vulnerability in FactoryTalk View Machine Edition allows attackers on the same network to delete arbitrary files on ...
Oct 14, 2025This vulnerability allows attackers to bypass authentication in the FTP service of Audi UTR 2.0 Universal Traffic Recorder by using any username/passw...
Sep 12, 2025This CVE describes an authentication bypass vulnerability in FOG Project versions 1.5.10.1673 and below that allows unauthenticated attackers to dump ...
Sep 6, 2025This vulnerability allows attackers to intercept or manipulate data during downloads due to insecure connection methods. It affects systems using Qual...
Jul 8, 2025This vulnerability allows attackers to brute-force authentication tags in session cookies of applications using Auth0-PHP SDK with CookieStore configu...
May 15, 2025This CVE describes an improper authentication vulnerability in Adobe ColdFusion that allows high-privileged attackers to bypass authentication mechani...
Apr 8, 2025This vulnerability in SPID.AspNetCore.Authentication allows attackers to bypass SAML signature validation by injecting a signed XML element. This enab...
Feb 18, 2025A critical SAML SSO vulnerability in Sentry allows attackers to take over any user account by using a malicious SAML Identity Provider and another org...
Jan 15, 2025CVE-2024-5805 is an authentication bypass vulnerability in Progress MOVEit Gateway's SFTP modules that allows attackers to gain unauthorized access wi...
Jun 25, 2024This vulnerability allows a rogue LTE base station to bypass authentication during network attachment, enabling man-in-the-middle attacks. It affects ...
Jun 3, 2024The D-Link DIR-845L router contains a permission bypass vulnerability in the getcfg.php component that allows attackers to access sensitive configurat...
May 6, 2024About Improper Authentication (CWE-287)
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Our database tracks 758 CVEs classified as CWE-287, with 333 rated critical and 309 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.3.
External reference: View CWE-287 on MITRE CWE →
Monitor Improper Authentication Vulnerabilities
Get alerted when new Improper Authentication CVEs affect your infrastructure.
Start Monitoring Free