CWE-290: CWE-290

167
Total CVEs
49
Critical
53
High
7.5
Avg CVSS
1
In CISA KEV

Yearly Trend

2026
17
2025
71
2024
47
2023
15
2022
7

Top Affected Vendors

1 Mozilla 11
2 Google 8
3 Huawei 6
4 Apache 6
5 Microsoft 3
6 Apple 3
7 Coredns.io 2
8 Fit2cloud 2
9 Gitlab 2
10 Canonical 2

All CWE-290 CVEs (167)

CVE-2023-32207
8.8

This vulnerability in Firefox, Firefox ESR, and Thunderbird allows attackers to bypass popup notification delays, tricking users into granting permiss...

Jun 2, 2023
CVE-2022-22476
8.8

This vulnerability allows authenticated users to impersonate other users by sending specially crafted requests to IBM WebSphere Application Server Lib...

Jul 8, 2022
CVE-2023-22474
8.7

Parse Server versions before 5.4.1 incorrectly trust the x-forwarded-for header to determine client IP addresses when not behind a proxy. This allows ...

Feb 3, 2023
CVE-2025-31170
8.4

This CVE describes an access control vulnerability in Huawei's security verification module that allows attackers to bypass authentication mechanisms....

Apr 7, 2025
CVE-2024-58124
8.4

This CVE describes an access control vulnerability in Huawei's security verification module that allows attackers to bypass authentication mechanisms....

Apr 7, 2025
CVE-2024-58126
8.4

This CVE describes an authentication bypass vulnerability in Huawei's security verification module that allows attackers to circumvent access controls...

Apr 7, 2025
CVE-2024-30191
8.4

This vulnerability affects multiple Siemens SCALANCE industrial wireless access points. A physically proximate attacker can trick affected devices int...

Apr 9, 2024
CVE-2023-6263
8.3

This vulnerability allows attackers to spoof legitimate VMS servers in Network Optix NxCloud, enabling them to intercept authorization headers from le...

Nov 22, 2023
CVE-2021-28372
8.3

This vulnerability in ThroughTek's Kalay Platform 2.0 allows attackers to impersonate any ThroughTek IoT device using a valid 20-byte UID. This enable...

Aug 17, 2021
CVE-2026-27700
8.2

This vulnerability in Hono framework versions 4.12.0-4.12.1 allows attackers to bypass IP-based access controls when using the AWS Lambda adapter behi...

Feb 25, 2026
CVE-2025-11209
8.2

This vulnerability allows attackers to spoof the URL bar (Omnibox) in Google Chrome on Android, making malicious websites appear legitimate. Users of ...

Nov 6, 2025
CVE-2025-56449
8.2

This vulnerability allows attackers to bypass MFA enforcement in Obsidian Scheduler by using Basic Authentication through the REST API even when accou...

Sep 29, 2025
CVE-2024-22519
8.2

CVE-2024-22519 is an authentication bypass vulnerability in OpenDroneID OSM 3.5.1 that allows attackers to impersonate legitimate drones by sending cr...

Feb 6, 2024
CVE-2023-43304
8.2

This vulnerability in the PARK DANDAN mini-app on Line v13.6.1 allows attackers to send malicious notifications by exploiting a leaked channel access ...

Dec 7, 2023
CVE-2026-24853
8.1

This vulnerability allows attackers to bypass Caido's domain whitelist protection by injecting a malicious X-Forwarded-Host header, enabling unauthori...

Feb 13, 2026
CVE-2025-62235
8.1

This vulnerability allows attackers to bypass authentication in Apache NimBLE by sending specially crafted Security Request packets. An attacker can r...

Jan 10, 2026
CVE-2025-30142
8.1

This vulnerability allows attackers to bypass authentication on G-Net Dashcam BB GONX devices by spoofing the MAC address of a previously paired devic...

Mar 18, 2025
CVE-2024-41107
8.1

CVE-2024-41107 is an authentication bypass vulnerability in Apache CloudStack's SAML authentication feature. When SAML authentication is enabled, atta...

Jul 19, 2024
CVE-2024-33531
8.1

This vulnerability in lua-resty-jwt 0.2.3 allows attackers to bypass JWT signature verification by crafting a JWT with an 'enc' header set to 'A256GCM...

Apr 24, 2024
CVE-2023-31424
8.1

This vulnerability allows remote unauthenticated attackers to bypass authentication and authorization mechanisms in Brocade SANnav's web interface. Af...

Aug 31, 2023
CVE-2022-30319
8.1

This vulnerability allows attackers to bypass authentication on Saia Burgess Controls (SBC) PCD controllers by spoofing UDP traffic on port 5050. Orga...

Jul 28, 2022
CVE-2023-3103
8.0

This CVE describes an authentication bypass vulnerability in Unitree Robotics A1 robots that allows a local attacker to perform a Man-in-the-Middle (M...

Nov 22, 2023
CVE-2025-13455
7.8

A local authentication bypass vulnerability in ThinkPlus configuration software allows authenticated users to enroll untrusted fingerprints on ThinkPl...

Jan 14, 2026
CVE-2025-54305
7.8

This vulnerability allows local attackers to bypass authentication in Thermo Fisher Torrent Suite Django application by spoofing localhost IP addresse...

Dec 4, 2025
CVE-2024-1524
7.7

This vulnerability allows a malicious actor to take over local user accounts when federated authentication with Silent Just-In-Time Provisioning is en...

Feb 24, 2026
CVE-2024-22092
7.7

This vulnerability in OpenHarmony allows remote attackers to bypass permission verification and install applications without proper authorization, tho...

Apr 2, 2024
CVE-2025-69401
7.5

This vulnerability allows attackers to bypass authentication and spoof identities in the WooODT Lite WordPress plugin. It affects all WooCommerce site...

Feb 20, 2026
CVE-2026-21862
7.5

This vulnerability allows attackers to bypass IP-based access controls in RustFS by spoofing their IP address using HTTP headers. Any client that can ...

Feb 3, 2026
CVE-2025-59802
7.5

This vulnerability in Foxit PDF Editor and Reader allows attackers to modify the visual content of digitally signed PDFs without invalidating the sign...

Dec 11, 2025
CVE-2025-66507
7.5

CVE-2025-66507 is an authentication bypass vulnerability in 1Panel that allows unauthenticated attackers to disable CAPTCHA verification by manipulati...

Dec 9, 2025
CVE-2025-14327
7.5

This vulnerability allows attackers to spoof download notifications in Firefox and Thunderbird, potentially tricking users into executing malicious fi...

Dec 9, 2025
CVE-2025-12430
7.5

A high-severity object lifecycle vulnerability in Google Chrome allows remote attackers to perform UI spoofing via crafted HTML pages. This enables at...

Nov 10, 2025
CVE-2025-27916
7.5

This vulnerability allows attackers to spoof AnyDesk IDs when connections are established via IP addresses, enabling impersonation of legitimate remot...

Nov 6, 2025
CVE-2025-6188
7.5

Arista EOS devices accept malicious UDP packets on port 3503 (LspPing Echo Reply), potentially allowing attackers to trigger unexpected behaviors in U...

Aug 25, 2025
CVE-2024-55925
7.5

This vulnerability allows attackers to bypass API host restrictions in Xerox Workplace Suite by forging Host headers. Attackers can access sensitive A...

Jan 23, 2025
CVE-2024-55470
7.5

CVE-2024-55470 allows attackers to bypass authentication in Oqtane Framework by manipulating the entityid parameter, enabling unauthorized login and a...

Dec 20, 2024
CVE-2024-10125
7.5

This vulnerability in the AWS ALB Identity ASP.NET Core middleware allows attackers to forge valid OIDC sessions when infrastructure is misconfigured....

Oct 22, 2024
CVE-2024-49193
7.5

This vulnerability in Zendesk allows attackers to read private ticket history by spoofing email addresses. Attackers can exploit insufficient email sp...

Oct 12, 2024
CVE-2023-30464
7.5

This vulnerability in CoreDNS allows attackers to perform DNS cache poisoning attacks using a birthday attack technique. Attackers can inject fake DNS...

Sep 18, 2024
CVE-2023-28452
7.5

CVE-2023-28452 is a DNS resolver vulnerability in CoreDNS that allows attackers to cause denial of service by sending forged DNS responses that cause ...

Sep 18, 2024
CVE-2024-5037
7.5

This vulnerability in OpenShift's Telemeter allows attackers to bypass JWT authentication by using forged tokens that evade issuer validation checks. ...

Jun 5, 2024
CVE-2023-4566
7.5

This vulnerability involves inaccurate trust relationships in distributed systems, potentially allowing unauthorized access to sensitive information. ...

Jan 16, 2024
CVE-2023-25743
7.5

This vulnerability in Firefox Focus allows malicious websites to spoof browser interface elements by entering fullscreen mode without proper user noti...

Jun 2, 2023
CVE-2021-34548
7.5

This vulnerability in Tor allows attackers to forge RELAY_END or RELAY_RESOLVED messages to bypass access controls for ending streams. It affects Tor ...

Jun 29, 2021
CVE-2021-28810
7.5

CVE-2021-28810 is an authentication bypass vulnerability in QNAP NAS devices running Roon Server that allows attackers to access restricted resources ...

Jun 8, 2021
CVE-2025-68644
7.4

Yealink RPS (Remote Provisioning Service) before June 27, 2025 allows unauthorized access to sensitive information including AutoP URL addresses due t...

Dec 21, 2025
CVE-2022-26505
7.4

CVE-2022-26505 is a DNS rebinding vulnerability in ReadyMedia (formerly MiniDLNA) that allows a malicious web server to bypass same-origin policy and ...

Mar 6, 2022
CVE-2025-3029
7.3

This vulnerability allows attackers to craft URLs with specific Unicode characters that hide the true origin of web pages, enabling spoofing attacks. ...

Apr 1, 2025
CVE-2025-36119
7.1

CVE-2025-36119 is a web session hijacking vulnerability in IBM Digital Certificate Manager for i (DCM) that allows authenticated non-administrator use...

Aug 8, 2025
CVE-2025-24458
7.1

This vulnerability in JetBrains YouTrack allows attackers to take over user accounts by spoofing email addresses and exploiting the Helpdesk integrati...

Jan 21, 2025

About CWE-290 (CWE-290)

Our database tracks 167 CVEs classified as CWE-290, with 49 rated critical and 53 rated high severity. The average CVSS score for CWE-290 vulnerabilities is 7.5.

External reference: View CWE-290 on MITRE CWE →

Monitor CWE-290 Vulnerabilities

Get alerted when new CWE-290 CVEs affect your infrastructure.

Start Monitoring Free