CWE-290: CWE-290
Yearly Trend
Top Affected Vendors
All CWE-290 CVEs (168)
This vulnerability in JetBrains YouTrack allows attackers to take over user accounts by spoofing email addresses and exploiting the Helpdesk integrati...
Jan 21, 2025CVE-2021-31172 is a spoofing vulnerability in Microsoft SharePoint Server that allows an attacker to trick users into performing actions they didn't i...
May 11, 2021This vulnerability in Thunderbird email client incorrectly displays signed OpenPGP messages as encrypted messages when crafted MIME emails claim to co...
Mar 10, 2025This vulnerability allows a physically proximate attacker to boot affected Entrust nShield HSM devices from a USB device with a valid root filesystem,...
Dec 2, 2025This vulnerability allows attackers with root privileges inside any LXD container to spoof their process names to impersonate other containers. This e...
Oct 2, 2025OpenClaw versions before 2026.2.14 have an authorization bypass vulnerability where Telegram allowlist matching uses mutable usernames instead of immu...
Mar 5, 2026CVE-2025-60538 is an authentication bypass vulnerability in shiori bookmark manager versions 1.7.4 and below. Attackers can brute force login credenti...
Jan 9, 2026This CVE describes an authentication bypass vulnerability in n8n's Stripe Trigger node that allows unauthenticated attackers to trigger workflows by s...
Jan 8, 2026This vulnerability in 1Panel allows attackers to bypass IP-based access controls by spoofing the X-Forwarded-For header. Any client can pretend to be ...
Dec 9, 2025This vulnerability allows unauthenticated attackers to join arbitrary organizations in GitLab by manipulating HTTP headers on certain requests. It aff...
Nov 26, 2025The Alt Redirect 1.6.3 addon for Statamic fails to properly sanitize query string parameters when the 'Query String Strip' feature is enabled, allowin...
Oct 10, 2025A spoofing vulnerability in Firefox for Android's WebAuthn component allows attackers to bypass authentication by presenting fake credentials. This af...
Sep 16, 2025An authentication bypass vulnerability in Blue Access' Cobalt X1 software allows unauthorized attackers to log into the application as administrators ...
Aug 5, 2025The fast-jwt library prior to version 5.0.6 improperly validates JWT issuer claims, allowing attackers to forge tokens by including both legitimate an...
Mar 19, 2025This vulnerability allows attackers to send excessive password reset emails to legitimate users by exploiting missing rate limiting in the Forgot Pass...
Feb 20, 2025This vulnerability allows attackers to send excessive password reset emails to legitimate users by exploiting missing rate limiting in the Forgot Pass...
Feb 20, 2025This vulnerability allows attackers to spoof website origins in permission prompts by truncating long URLs, potentially tricking users into granting p...
Oct 29, 2024This vulnerability allows attackers to bypass multi-factor authentication in WS_FTP Server's Web Transfer Module. Users can log in with only username ...
Aug 28, 2024This vulnerability in Annonshop.app's anonymousLocker component allows attackers to send messages that appear to come from arbitrary users by crafting...
Jun 13, 2024This vulnerability allows attackers on the same network to access the TP-Link TL-WR902AC router's web interface without authentication and retrieve st...
May 3, 2024Signal K Server versions before 2.19.0 have vulnerabilities that allow attackers to craft convincing social engineering attacks against administrators...
Jan 1, 2026This vulnerability allows attackers to forge signatures on nested JAR files in Spring Boot applications, making malicious content appear signed by tru...
Aug 23, 2024This vulnerability allows an authenticated attacker to bypass two-factor authentication (2FA) in Devolutions Server by using another browser tab to au...
Jun 25, 2024CVE-2024-51406 is an authentication bypass vulnerability in Floodlight SDN OpenFlow Controller v1.2 where local hosts can craft fake LLDP packets to m...
Nov 1, 2024This vulnerability in Openfire's SASL EXTERNAL authentication allows attackers to impersonate legitimate users by crafting malicious X.509 certificate...
Sep 15, 2025A logic error in Cisco ASA and FTD software's Network Service Group ACL implementation allows unauthenticated remote attackers to bypass configured ac...
Oct 23, 2024This vulnerability allows unauthenticated remote attackers to bypass Cisco Snort IPS rules by sending specially crafted HTTP packets. Affected systems...
May 22, 2024This CVE describes a spoofing vulnerability in Firefox and Thunderbird's DOM copy-paste and drag-drop components. Attackers can manipulate clipboard o...
Jan 13, 2026The CSC Pay Mobile App version 2.19.4 contains a payment authorization bypass vulnerability where users can disable Bluetooth at a specific point duri...
Aug 1, 2025This vulnerability allows attackers to spoof browser UI elements like tab titles and URLs via malicious web pages. It affects all users running vulner...
May 27, 2025The HttpAuth plugin in pGina.Fork allows authentication bypass when an attacker controls DNS resolution for the pginaloginserver domain. This vulnerab...
May 15, 2025An Insecure Direct Object Reference (IDOR) vulnerability in PHPGurukul Online Notes Sharing Management System v1.0 allows unauthorized users to delete...
Dec 18, 2024This vulnerability allows attackers to bypass CAPTCHA verification in the BestWebSoft Google Captcha WordPress plugin, enabling identity spoofing and ...
Jan 27, 2025This vulnerability allows attackers to bypass IP-based authentication in the Secure Admin IP WordPress plugin by spoofing their IP address. Attackers ...
Dec 13, 2024Typecho v1.3.0 contains a client IP spoofing vulnerability that allows attackers to falsify their IP addresses by manipulating X-Forwarded-For or Clie...
Aug 19, 2024This CVE describes an IP spoofing vulnerability in Likeshop that allows attackers to forge X-Forwarded or Client-IP headers to bypass IP-based securit...
Aug 7, 2024This vulnerability allows attackers to bypass image protection in the Patreon WordPress plugin by spoofing authentication, enabling unauthorized acces...
Jul 9, 2024This authentication bypass vulnerability in Checkmk allows remote attackers to access HTTP endpoints without proper credentials, potentially exposing ...
Jul 8, 2024This CVE describes an authentication bypass vulnerability in the miniorange Malware Scanner WordPress plugin that allows attackers to spoof IP address...
Jun 4, 2024This vulnerability allows attackers to bypass IP-based access restrictions in the WPMU DEV Branda WordPress plugin by spoofing their IP address. It af...
Jun 4, 2024This vulnerability allows attackers to bypass IP-based access restrictions in the WordPress Restricted Site Access plugin by spoofing authentication. ...
Jun 4, 2024This vulnerability allows attackers to bypass IP-based country blocking restrictions in the IP2Location Country Blocker WordPress plugin by spoofing I...
Jun 4, 2024This CVE describes an authentication bypass vulnerability in the Royal Elementor Addons WordPress plugin that allows attackers to spoof IP addresses a...
May 17, 2024This vulnerability allows attackers to bypass IP-based access restrictions in the WPMU DEV Defender Security WordPress plugin by spoofing authenticati...
May 17, 2024This vulnerability allows local attackers to bypass the lock screen authentication in Reolink desktop applications by modifying client-side JavaScript...
Oct 21, 2025This vulnerability in matrix-rust-sdk allows malicious homeserver operators to modify encrypted events, making them appear to be sent by different use...
Jun 10, 2025This vulnerability in Ubuntu's gnome-control-center fails to accurately display SSH remote login status when systemd socket activation is used for ope...
Apr 15, 2025This vulnerability allows an authenticated attacker on an adjacent network to spoof their identity in Microsoft Configuration Manager, potentially byp...
Oct 31, 2025CVE-2020-6158 is an address bar spoofing vulnerability in Opera Mini for Android that allows malicious websites to display a fake URL in the browser's...
Feb 21, 2025This vulnerability allows malicious websites to spoof URL addresses displayed in the Focus navigation bar on iOS devices. Attackers can make a malicio...
Sep 3, 2024About CWE-290 (CWE-290)
Our database tracks 168 CVEs classified as CWE-290, with 49 rated critical and 54 rated high severity. The average CVSS score for CWE-290 vulnerabilities is 7.5.
External reference: View CWE-290 on MITRE CWE →
Monitor CWE-290 Vulnerabilities
Get alerted when new CWE-290 CVEs affect your infrastructure.
Start Monitoring Free