CWE-287: Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

758
Total CVEs
333
Critical
309
High
8.3
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
66
2025
217
2024
134
2023
115
2022
70

Top Affected Vendors

1 Apache 15
2 Qualcomm 12
3 Huawei 11
4 Microsoft 11
5 Debian 10
6 Dlink 9
7 Cisco 9
8 Dell 9
9 Fedoraproject 8
10 Adobe 8

All Improper Authentication CVEs (758)

CVE-2020-12126
9.8

This CVE describes multiple authentication bypass vulnerabilities in the WAVLINK WN530H4 router's /cgi-bin/ endpoint. Attackers can access router sett...

Oct 2, 2020
CVE-2020-26105
9.8

CVE-2020-26105 is an authentication bypass vulnerability in cPanel's chkservd service that uses insecure test credentials on templated virtual machine...

Sep 25, 2020
CVE-2019-16028
9.8

This critical vulnerability allows unauthenticated remote attackers to bypass authentication and gain administrative access to Cisco Firepower Managem...

Sep 23, 2020
CVE-2020-16098
9.8

CVE-2020-16098 allows unauthenticated attackers to enumerate access card credentials from Gallagher Command Centre security systems via network connec...

Sep 15, 2020
CVE-2020-24987
9.8

This vulnerability allows remote attackers to execute arbitrary code on Tenda AC18 routers without authentication when the administrator UI is configu...

Sep 4, 2020
CVE-2020-24029
9.8

CVE-2020-24029 allows unauthenticated attackers to change passwords in ForLogic Qualiex v1 and v3 without proper validation, enabling unauthorized acc...

Sep 2, 2020
CVE-2020-5777
9.8

CVE-2020-5777 allows remote attackers to bypass authentication in MAGMI (Magento Mass Importer) by overwhelming database connections and exploiting de...

Sep 1, 2020
CVE-2020-24786
9.8

This vulnerability allows unauthenticated attackers to bypass authentication in multiple Zoho ManageEngine products via a Java servlet. Attackers can ...

Aug 31, 2020
CVE-2020-5608
9.8

This vulnerability allows remote unauthenticated attackers to bypass authentication and send manipulated communication packets to Yokogawa industrial ...

Aug 5, 2020
CVE-2020-5616
9.8

CVE-2020-5616 is an authentication bypass vulnerability in multiple PHP-Factory free edition web applications that allows remote attackers to gain adm...

Aug 4, 2020
CVE-2020-3297
9.8

CVE-2020-3297 allows unauthenticated remote attackers to bypass authentication on Cisco Small Business Smart and Managed Switches by brute-forcing wea...

Jul 2, 2020
CVE-2017-7921
9.8

This vulnerability allows attackers to bypass authentication on affected Hikvision IP cameras and surveillance devices, potentially gaining unauthoriz...

May 6, 2017
CVE-2026-1568
9.6

A signature verification vulnerability in Rapid7 InsightVM's Assertion Consumer Service allows attackers to bypass authentication and gain unauthorize...

Feb 3, 2026
CVE-2025-66022
9.6

CVE-2025-66022 is a critical vulnerability in FACTION PenTesting Report Generation Framework that allows unauthenticated attackers to upload malicious...

Nov 26, 2025
CVE-2024-6107
9.6

This authentication bypass vulnerability in MAAS allows attackers to execute unauthorized RPC commands without proper credentials. Systems running vul...

Jul 21, 2025
CVE-2025-52553
9.6

This vulnerability in authentik allows session hijacking through Remote Access Control (RAC) tokens. An attacker who obtains a RAC token URL (e.g., vi...

Jun 27, 2025
CVE-2024-45347
9.6

This vulnerability allows attackers to bypass authentication in Xiaomi Mi Connect Service APP due to flawed validation logic, enabling unauthorized ac...

Jun 23, 2025
CVE-2025-30215
9.6

This CVE-2025-30215 is an improper access control vulnerability in NATS-Server's JetStream management system. It allows any user with JetStream manage...

Apr 16, 2025
CVE-2024-23471
9.6

This vulnerability allows authenticated users of SolarWinds Access Rights Manager to execute arbitrary code remotely by exploiting improper authentica...

Jul 17, 2024
CVE-2024-22245
9.6

This vulnerability in VMware's deprecated Enhanced Authentication Plug-in (EAP) allows attackers to trick users into relaying authentication requests,...

Feb 20, 2024
CVE-2023-28727
9.6

CVE-2023-28727 is an authentication bypass vulnerability in Panasonic AiSEG2 home energy management systems. Attackers on the same network can bypass ...

Mar 31, 2023
CVE-2022-24422
9.6

CVE-2022-24422 is an improper authentication vulnerability in Dell iDRAC9 that allows remote unauthenticated attackers to bypass authentication and ga...

May 26, 2022
CVE-2021-38412
9.6

This vulnerability allows unauthenticated attackers to send specially crafted POST requests to Digi PortServer TS 16 Rack devices, enabling SNMP servi...

Sep 17, 2021
CVE-2021-28494
9.6

This vulnerability allows unprivileged users to bypass authentication in Arista's Metamako Operating System Web UI under certain conditions. It affect...

Sep 9, 2021
CVE-2021-22943
9.6

This vulnerability allows an attacker who has already compromised a network to take control of UniFi Protect cameras on that network. It affects UniFi...

Aug 31, 2021
CVE-2021-21538
9.6

Dell EMC iDRAC9 versions 4.40.00.00 through 4.40.10.00 contain an improper authentication vulnerability that allows remote unauthenticated attackers t...

Jul 29, 2021
CVE-2020-13292
9.6

This vulnerability allows attackers to bypass email verification requirements in GitLab's OAuth flow, enabling unauthorized account access. It affects...

Aug 10, 2020
CVE-2025-67822
9.4

An authentication bypass vulnerability in Mitel MiVoice MX-ONE Provisioning Manager allows unauthenticated attackers to gain unauthorized access to us...

Jan 15, 2026
CVE-2026-21891
9.4

This vulnerability allows authentication bypass in ZimaOS by exploiting improper password validation for system service accounts. Attackers can gain a...

Jan 8, 2026
CVE-2025-59934
9.4

This vulnerability allows attackers to bypass authentication in Formbricks by forging JWT tokens without signature verification. Attackers who know a ...

Sep 26, 2025
CVE-2025-56752
9.4

This critical authentication bypass vulnerability in Ruijie RG-ES series switches allows remote attackers to gain full administrative control without ...

Sep 3, 2025
CVE-2025-55293
9.4

This vulnerability allows an attacker to impersonate legitimate nodes in a Meshtastic mesh network by manipulating public key assignments. Attackers c...

Aug 18, 2025
CVE-2023-6768
9.4

CVE-2023-6768 is an authentication bypass vulnerability in Amazing Little Poll that allows unauthenticated attackers to access the admin panel without...

Dec 20, 2023
CVE-2021-30317
9.3

This vulnerability allows attackers to bypass image verification in Qualcomm Snapdragon chipsets by exploiting improper validation of ELF metadata in ...

Feb 11, 2022
CVE-2026-27197
9.1

This critical vulnerability in Sentry's SAML SSO implementation allows attackers to take over any user account by exploiting misconfigured multi-organ...

Feb 21, 2026
CVE-2026-25804
9.1

This vulnerability in Antrea's network policy priority assignment system causes incorrect traffic enforcement due to a uint16 arithmetic overflow when...

Feb 6, 2026
CVE-2026-21881
9.1

This critical authentication bypass vulnerability in Kanboard allows attackers to impersonate any user, including administrators, by sending spoofed H...

Jan 8, 2026
CVE-2025-62717
9.1

Emlog Pro 2.5.23 has a session verification code error that allows attackers to reuse email verification codes. This authentication bypass vulnerabili...

Oct 24, 2025
CVE-2025-61922
9.1

A critical authentication bypass vulnerability in PrestaShop Checkout payment module allows attackers to silently log in as any user via email manipul...

Oct 16, 2025
CVE-2025-9064
9.1

An unauthenticated path traversal vulnerability in FactoryTalk View Machine Edition allows attackers on the same network to delete arbitrary files on ...

Oct 14, 2025
CVE-2025-45583
9.1

This vulnerability allows attackers to bypass authentication in the FTP service of Audi UTR 2.0 Universal Traffic Recorder by using any username/passw...

Sep 12, 2025
CVE-2025-58443
EPSS 10.2% 9.1

This CVE describes an authentication bypass vulnerability in FOG Project versions 1.5.10.1673 and below that allows unauthenticated attackers to dump ...

Sep 6, 2025
CVE-2025-21450
9.1

This vulnerability allows attackers to intercept or manipulate data during downloads due to insecure connection methods. It affects systems using Qual...

Jul 8, 2025
CVE-2025-47275
9.1

This vulnerability allows attackers to brute-force authentication tags in session cookies of applications using Auth0-PHP SDK with CookieStore configu...

May 15, 2025
CVE-2025-30282
9.1

This CVE describes an improper authentication vulnerability in Adobe ColdFusion that allows high-privileged attackers to bypass authentication mechani...

Apr 8, 2025
CVE-2025-24894
9.1

This vulnerability in SPID.AspNetCore.Authentication allows attackers to bypass SAML signature validation by injecting a signed XML element. This enab...

Feb 18, 2025
CVE-2025-22146
9.1

A critical SAML SSO vulnerability in Sentry allows attackers to take over any user account by using a malicious SAML Identity Provider and another org...

Jan 15, 2025
CVE-2024-5805
9.1

CVE-2024-5805 is an authentication bypass vulnerability in Progress MOVEit Gateway's SFTP modules that allows attackers to gain unauthorized access wi...

Jun 25, 2024
CVE-2023-43551
9.1

This vulnerability allows a rogue LTE base station to bypass authentication during network attachment, enabling man-in-the-middle attacks. It affects ...

Jun 3, 2024
CVE-2024-33110
9.1

The D-Link DIR-845L router contains a permission bypass vulnerability in the getcfg.php component that allows attackers to access sensitive configurat...

May 6, 2024

About Improper Authentication (CWE-287)

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Our database tracks 758 CVEs classified as CWE-287, with 333 rated critical and 309 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.3.

External reference: View CWE-287 on MITRE CWE →

Monitor Improper Authentication Vulnerabilities

Get alerted when new Improper Authentication CVEs affect your infrastructure.

Start Monitoring Free