CWE-290: CWE-290

168
Total CVEs
49
Critical
54
High
7.5
Avg CVSS
1
In CISA KEV

Yearly Trend

2026
17
2025
71
2024
47
2023
15
2022
7

Top Affected Vendors

1 Mozilla 11
2 Google 8
3 Apache 7
4 Huawei 6
5 Microsoft 3
6 Apple 3
7 Coredns.io 2
8 Fit2cloud 2
9 Gitlab 2
10 Canonical 2

All CWE-290 CVEs (168)

CVE-2025-56689
4.6

CVE-2025-56689 allows attackers to bypass OTP/MFA authentication in Quest Safeguard for Privileged Passwords by replaying intercepted valid OTP respon...

Sep 3, 2025
CVE-2025-13634
4.4

This vulnerability allows a local attacker to bypass the Mark of the Web (MOTW) security feature in Google Chrome on Windows. Attackers can craft HTML...

Dec 2, 2025
CVE-2025-13635
4.4

This vulnerability allows a local attacker to spoof the Chrome downloads UI via a malicious HTML page, tricking users into believing they're interacti...

Dec 2, 2025
CVE-2025-13636
4.3

This vulnerability in Google Chrome's Split View feature allows attackers to perform UI spoofing by tricking users into performing specific UI gesture...

Dec 2, 2025
CVE-2025-43503
4.3

This CVE describes a user interface spoofing vulnerability in Apple operating systems and Safari browser. Visiting a malicious website could allow att...

Nov 4, 2025
CVE-2025-43493
4.3

This CVE describes an address bar spoofing vulnerability in Apple web browsers. Visiting a malicious website could allow attackers to display a fake U...

Nov 4, 2025
CVE-2025-5605
4.3

An authentication bypass vulnerability in WSO2 Management Console allows attackers with console access to manipulate request URIs and access restricte...

Oct 24, 2025
CVE-2025-32275
4.3

This vulnerability allows attackers to bypass authentication in the Ays Pro Survey Maker WordPress plugin by spoofing identities. It affects all WordP...

Apr 10, 2025
CVE-2025-32227
4.3

This vulnerability allows attackers to bypass authentication in Asgaros Forum WordPress plugin by spoofing user identities. It affects all Asgaros For...

Apr 10, 2025
CVE-2024-7981
4.3

This vulnerability allows attackers to create deceptive UI elements in Google Chrome through crafted HTML pages, enabling UI spoofing attacks. It affe...

Aug 21, 2024
CVE-2025-56608
4.2

This vulnerability allows attackers to potentially bypass authentication in the Corona Virus Tracker App India by exploiting weak MD5 hashing. Attacke...

Sep 3, 2025
CVE-2025-26421
4.0

This CVE describes a lock screen bypass vulnerability in Android that allows local privilege escalation without user interaction. Attackers with physi...

Sep 4, 2025
CVE-2025-13015
3.4

This CVE describes a spoofing vulnerability in Mozilla Firefox and Thunderbird that could allow an attacker to trick users into believing they are int...

Nov 11, 2025
CVE-2026-0834
N/A

This CVE describes a logic vulnerability in TP-Link Archer routers that allows unauthenticated attackers on the same local network to execute administ...

Jan 21, 2026
CVE-2025-36754
N/A

This vulnerability allows unauthenticated attackers to bypass authentication on the web interface by crafting POST requests without proper session val...

Dec 13, 2025
CVE-2025-13953
N/A

This vulnerability allows attackers to bypass authentication in the GTT Tax Information System by impersonating the local WebSocket connection used fo...

Dec 10, 2025
CVE-2025-27389
N/A

This vulnerability in ColorOS allows malicious applications to bypass security warnings during installation under specific conditions. It affects Oppo...

Dec 5, 2025
CVE-2025-12414
N/A

An attacker can take over Looker accounts in instances configured with OIDC authentication due to email address string normalization issues. This affe...

Nov 20, 2025

About CWE-290 (CWE-290)

Our database tracks 168 CVEs classified as CWE-290, with 49 rated critical and 54 rated high severity. The average CVSS score for CWE-290 vulnerabilities is 7.5.

External reference: View CWE-290 on MITRE CWE →

Monitor CWE-290 Vulnerabilities

Get alerted when new CWE-290 CVEs affect your infrastructure.

Start Monitoring Free