CWE-287: Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

762
Total CVEs
336
Critical
310
High
8.3
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
67
2025
217
2024
134
2023
115
2022
70

Top Affected Vendors

1 Apache 15
2 Qualcomm 12
3 Huawei 11
4 Microsoft 11
5 Debian 10
6 Dlink 9
7 Cisco 9
8 Dell 9
9 Fedoraproject 8
10 Adobe 8

All Improper Authentication CVEs (762)

CVE-2024-25699
8.5

An improper authentication vulnerability in Esri Portal for ArcGIS and ArcGIS Enterprise allows authenticated low-privileged attackers to bypass autho...

Apr 4, 2024
CVE-2023-24852
8.4

This vulnerability allows memory corruption in Qualcomm's Core due to improper secure memory access while loading modem images. Attackers could potent...

Nov 7, 2023
CVE-2022-0916
8.4

This vulnerability in Logitech Options software allows attackers to perform Cross-Site Request Forgery (CSRF) attacks during OAuth 2.0 authentication ...

May 3, 2022
CVE-2025-22477
8.3

Dell Storage Manager version 20.1.20 contains an improper authentication vulnerability that allows adjacent network attackers to bypass authentication...

May 6, 2025
CVE-2022-30238
8.3

CVE-2022-30238 is an authentication bypass vulnerability in Schneider Electric Wiser Smart energy management systems that allows attackers to hijack a...

Jun 2, 2022
CVE-2021-44458
8.3

CVE-2021-44458 is a critical authentication bypass vulnerability in Lens Kubernetes IDE that allows malicious websites to make unauthorized websocket ...

Jan 10, 2022
CVE-2026-29193
8.2

This vulnerability in ZITADEL's login interface allows users to bypass configured security policies and self-register accounts or use password authent...

Mar 7, 2026
CVE-2026-28787
8.2

This vulnerability in OneUptime allows attackers to bypass two-factor authentication by replaying stolen WebAuthn assertions. The flaw occurs because ...

Mar 6, 2026
CVE-2025-65781
8.2

This vulnerability in Wekan allows attackers to cause application-layer denial of service (DoS) by sending any non-empty Authorization bearer token to...

Dec 15, 2025
CVE-2025-49146
8.2

The pgjdbc PostgreSQL JDBC driver incorrectly allows connections with authentication methods that don't support channel binding when channel binding i...

Jun 11, 2025
CVE-2025-30287
8.2

This CVE describes an improper authentication vulnerability in Adobe ColdFusion that allows low-privileged local attackers to bypass security controls...

Apr 8, 2025
CVE-2024-42336
8.2

CVE-2024-42336 is an improper authentication vulnerability in Servision products that allows attackers to bypass authentication mechanisms. This affec...

Aug 20, 2024
CVE-2024-24554
8.2

This vulnerability in Bludit allows attackers to bypass authentication by predicting sensitive tokens generated using weak MD5 hashing with predictabl...

Jun 24, 2024
CVE-2023-34196
8.2

This vulnerability in Keyfactor EJBCA allows unauthenticated or less privileged users to access CA certificates (including attributes and public keys)...

Aug 3, 2023
CVE-2023-28073
8.2

Dell BIOS contains an authentication bypass vulnerability that allows a local attacker with physical or administrative access to bypass security contr...

Jun 23, 2023
CVE-2023-30845
8.2

CVE-2023-30845 is an authentication bypass vulnerability in ESPv2 service proxy versions 2.20.0 through 2.42.0. Attackers can craft malicious X-HTTP-M...

Apr 26, 2023
CVE-2023-0209
8.2

This vulnerability in NVIDIA DGX-1 SBIOS allows attackers to execute arbitrary code or bypass security features like SecureBoot due to missing authent...

Apr 22, 2023
CVE-2021-21378
8.2

This vulnerability in Envoy proxy allows attackers to bypass JWT authentication by presenting tokens from unauthorized issuers when the 'allow_missing...

Mar 11, 2021
CVE-2026-30851
8.1

Caddy servers running versions 2.10.0 through 2.11.1 with forward_auth middleware configured are vulnerable to identity injection and privilege escala...

Mar 7, 2026
CVE-2026-29093
8.1

This vulnerability exposes memcached session storage without authentication in WWBN AVideo's Docker configuration, allowing attackers to hijack sessio...

Mar 6, 2026
CVE-2026-27134
8.1

This vulnerability allows unauthorized authentication in Strimzi Kafka clusters when using custom CA certificates with multi-stage chains. Attackers w...

Feb 21, 2026
CVE-2026-24038
8.1

This vulnerability allows attackers to bypass two-factor authentication in Horilla HRMS by omitting the OTP field from authentication requests. When t...

Jan 22, 2026
CVE-2025-14002
8.1

The WPCOM Member WordPress plugin has an authentication bypass vulnerability that allows attackers to brute-force 6-digit OTP codes within a 10-minute...

Dec 16, 2025
CVE-2025-67507
8.1

This vulnerability allows attackers to bypass multi-factor authentication (MFA) in Filament applications by reusing the same recovery code indefinitel...

Dec 10, 2025
CVE-2025-62169
8.1

OctoPrint-SpoolManager plugin versions 1.7.7 and older (stable) and 1.8.0a2 and older (testing) have missing authentication and authorization checks i...

Oct 23, 2025
CVE-2025-20160
8.1

This vulnerability in Cisco IOS and IOS XE software allows attackers to intercept unencrypted TACACS+ authentication messages or impersonate TACACS+ s...

Sep 24, 2025
CVE-2025-6505
8.1

This vulnerability in Progress Software's Hybrid Data Pipeline Server allows attackers to combine OAuth client credentials from both HTTP headers and ...

Jul 29, 2025
CVE-2025-6763
8.1

This CVE describes an authentication bypass vulnerability in Comet System's web-based management interface affecting multiple device models. Attackers...

Jun 27, 2025
CVE-2025-22236
8.1

This CVE describes an authorization bypass vulnerability in Salt's minion event bus. An attacker with a compromised minion key can craft messages to e...

Jun 13, 2025
CVE-2024-11087
8.1

This vulnerability allows unauthenticated attackers to bypass authentication in WordPress sites using the miniOrange Social Login Pro Addon plugin. At...

Mar 8, 2025
CVE-2025-1723
8.1

ManageEngine ADSelfService Plus versions 6510 and below have a session handling vulnerability that allows account takeover. Only valid account holders...

Mar 3, 2025
CVE-2023-31279
8.1

CVE-2023-31279 allows unauthorized attackers to register unmanaged Sierra Wireless devices on the AirVantage platform when the AirVantage Management S...

Dec 21, 2024
CVE-2024-11293
8.1

This vulnerability allows unauthenticated attackers to bypass authentication in WordPress sites using the Pie Register plugin. Attackers can log in as...

Dec 4, 2024
CVE-2024-45106
8.1

This vulnerability in Apache Ozone's S3 Gateway allows any authenticated Kerberos user to revoke and regenerate S3 secrets of any other user, potentia...

Dec 3, 2024
CVE-2024-45369
8.1

This CVE describes an authentication bypass vulnerability where weak authentication mechanisms allow attackers to impersonate legitimate users or reso...

Nov 22, 2024
CVE-2024-10020
8.1

The Heateor Social Login WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to log in as any existing u...

Nov 6, 2024
CVE-2024-10327
8.1

This vulnerability in Okta Verify for iOS allows attackers to bypass push notification authentication by exploiting the iOS ContextExtension feature. ...

Oct 24, 2024
CVE-2024-9947
8.1

The ProfilePress Pro WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to log in as any existing user,...

Oct 23, 2024
CVE-2024-47768
8.1

This vulnerability in Lif Authentication Server allows attackers to reset any user's password without providing the required email verification code. ...

Oct 4, 2024
CVE-2024-47807
8.1

This vulnerability in Jenkins OpenId Connect Authentication Plugin allows attackers to bypass authentication by forging ID tokens without proper issue...

Oct 2, 2024
CVE-2024-47078
8.1

CVE-2024-47078 is an authentication and authorization bypass vulnerability in Meshtastic's MQTT implementation that allows unauthorized control of MQT...

Sep 25, 2024
CVE-2024-45823
8.1

CVE-2024-45823 is an authentication bypass vulnerability in Rockwell Automation products where shared secrets across accounts allow threat actors to i...

Sep 12, 2024
CVE-2024-39830
8.1

Mattermost versions with shared channels enabled are vulnerable to a timing attack that allows retrieval of remote cluster tokens. Attackers can explo...

Jul 3, 2024
CVE-2024-28735
8.1

This vulnerability allows authenticated users in Unit4 Financials by Coda to bypass authorization controls and reset passwords for any user account vi...

Mar 20, 2024
CVE-2023-44302
8.1

Dell PowerProtect Data Manager DM5500 appliances running version 5.14.0.0 and earlier contain an improper authentication vulnerability (CWE-287). Remo...

Dec 4, 2023
CVE-2023-37283
8.1

This vulnerability allows authentication bypass in PingFederate's Identifier First Adapter when configured in a specific, non-recommended way. Attacke...

Oct 25, 2023
CVE-2023-32347
8.1

This vulnerability in Teltonika's Remote Management System allows attackers who obtain a device's serial number and MAC address to authenticate as tha...

May 22, 2023
CVE-2023-2706
8.1

This vulnerability allows unauthenticated attackers to bypass authentication in the OTP Login Woocommerce & Gravity Forms WordPress plugin by obtainin...

May 17, 2023
CVE-2023-29032
8.1

This vulnerability in Apache OpenMeetings allows attackers with access to certain private information to impersonate other users. It affects Apache Op...

May 12, 2023
CVE-2023-1752
8.1

This vulnerability in Nexx Smart Home devices allows any user to register an already registered alarm or associated device using only the device's MAC...

Apr 4, 2023

About Improper Authentication (CWE-287)

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Our database tracks 762 CVEs classified as CWE-287, with 336 rated critical and 310 rated high severity. The average CVSS score for Improper Authentication vulnerabilities is 8.3.

External reference: View CWE-287 on MITRE CWE →

Monitor Improper Authentication Vulnerabilities

Get alerted when new Improper Authentication CVEs affect your infrastructure.

Start Monitoring Free