CWE-639: CWE-639
Yearly Trend
Top Affected Vendors
All CWE-639 CVEs (518)
This CVE describes a Broken Object Level Authorization (BOLA) vulnerability in Easy!Appointments webhook endpoints that allows low-privileged authenti...
Jul 9, 2024The LatePoint Plugin for WordPress has an authorization bypass vulnerability that allows unauthenticated attackers to access other customers' personal...
Jun 14, 2024This vulnerability allows attackers to perform man-in-the-middle attacks on SSH connections to ethOS mining rigs and easily identify all public IPv4 n...
Apr 30, 2024This vulnerability in Zammad allows attackers to brute-force guessable FormIDs used in the upload cache, enabling them to inject malicious content int...
Apr 26, 2024This vulnerability allows unauthenticated attackers to download the configuration file from TOTOLINK EX200 routers via a specific CGI script. This exp...
Apr 8, 2024This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the WordPress Thumbs Rating plugin. It allows attackers to bypass autho...
Mar 31, 2024This CVE describes a CORS bypass vulnerability in go-zero web framework where the `isOriginAllowed` function uses `strings.HasSuffix` to validate orig...
Mar 6, 2024CVE-2023-6144 is an authentication bypass vulnerability in Dev Blog v1.0 that allows attackers to take over any user account by manipulating the 'user...
Nov 21, 2023This CVE describes an authorization bypass vulnerability in Apache ZooKeeper when SASL Quorum Peer authentication is enabled. An attacker can join the...
Oct 11, 2023CVE-2023-44206 is an authorization bypass vulnerability in Acronis Cyber Protect 15 that allows attackers to access and manipulate sensitive informati...
Sep 27, 2023The Blackhole for Bad Bots WordPress plugin before version 3.3.2 uses untrusted HTTP headers to determine client IP addresses, allowing attackers to s...
Apr 4, 2022CVE-2022-0686 is an authorization bypass vulnerability in the url-parse npm package where attackers can manipulate URL parsing to bypass authenticatio...
Feb 20, 2022Zitadel's Admin API contains Insecure Direct Object Reference (IDOR) vulnerabilities that allow authenticated users without proper IAM roles to modify...
Mar 4, 2025The Videospirecore Theme Plugin for WordPress has an authentication bypass vulnerability that allows authenticated attackers with Subscriber-level acc...
Feb 11, 2026This CVE describes a privilege escalation vulnerability in Craft CMS's GraphQL API where authenticated users with write access to one asset volume can...
Feb 9, 2026This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in D-Link D-View 8 network management software. Any authenticated user can...
Jan 21, 2026An authorization bypass vulnerability in Broadcom DX NetOps Spectrum allows attackers to escalate privileges by manipulating user-controlled keys. Thi...
Jan 12, 2026AVideo versions before 20.1 contain an insecure direct object reference vulnerability that allows any authenticated user to upload files into other us...
Dec 17, 2025This vulnerability allows any authenticated user to upload comment images to videos owned by other users in AVideo. Attackers can perform unauthorized...
Dec 17, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to change passwords of any user, including administrato...
Oct 9, 2025This vulnerability allows authenticated attackers with Subscriber-level access or higher to change arbitrary users' email addresses, including adminis...
Sep 10, 2025The WPGYM WordPress plugin has a privilege escalation vulnerability that allows authenticated attackers with Subscriber-level access or higher to modi...
Sep 10, 2025The Eventin WordPress plugin has a privilege escalation vulnerability that allows attackers with contributor-level permissions or higher to change any...
Aug 8, 2025CVE-2025-46386 is an authorization bypass vulnerability where attackers can manipulate user-controlled keys to access unauthorized resources. This aff...
Aug 6, 2025The Reales WP STPT WordPress plugin allows authenticated attackers with subscriber-level access to change arbitrary users' passwords and email address...
May 6, 2025This vulnerability allows authenticated attackers with teacher-level access or higher in the WPSchoolPress WordPress plugin to escalate privileges by ...
Mar 15, 2025CVE-2024-53406 is an authentication bypass vulnerability in Espressif ESP-IDF v5.3.0 where the device reuses session keys during reconnection, allowin...
Mar 13, 2025An authorization bypass vulnerability in Mavenir SCE Application Provisioning Portal allows authenticated 'guest' users to perform administrative acti...
Feb 12, 2025This CVE describes an authorization bypass vulnerability in Schneider Electric devices where authenticated attackers can manipulate HTTPS requests to ...
Jan 17, 2025This vulnerability in QOCA aim software allows remote attackers with regular user privileges to bypass authorization controls by manipulating user ID ...
Dec 31, 2024This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in SiSMART v7.4.0 dashboard that allows attackers to access other users' d...
Nov 1, 2024This vulnerability in the PublishPress Authors WordPress plugin allows authenticated attackers with Author-level access or higher to modify arbitrary ...
Oct 17, 2024The WP 2FA with Telegram plugin for WordPress has an authentication bypass vulnerability that allows authenticated attackers with subscriber-level per...
Oct 15, 2024This vulnerability allows authenticated WordPress users with subscriber or customer permissions to modify administrator email addresses via an insecur...
Sep 25, 2024This vulnerability allows authenticated WordPress users with subscriber-level access or higher to escalate privileges by changing administrative user ...
Sep 6, 2024This IDOR vulnerability in lunary-ai/lunary allows unauthorized users to view, modify, or delete any dataset_prompt or dataset_prompt_variation across...
Jun 6, 2024This vulnerability allows attackers to bypass authorization controls in the Hearing Tracking System by manipulating user-controlled keys, enabling aut...
Feb 9, 2024This CVE describes an authorization bypass vulnerability in Mia Technology's MİA-MED software where attackers can manipulate user-controlled keys to ...
Feb 8, 2024This vulnerability in the PrestaShop 'Order Duplicator' module allows unauthenticated guests to download customer personal information including names...
Nov 7, 2023This vulnerability allows remote attackers to execute arbitrary code on systems running minCal v1.0.0 by sending a specially crafted script to the cus...
Oct 30, 2023This vulnerability in QSige login SSO allows authenticated users to access resources without proper permission checks. Attackers who have valid login ...
Oct 3, 2023The Simplr Registration Form Plus+ WordPress plugin has an insecure direct object reference vulnerability that allows authenticated users with subscri...
Sep 13, 2023This vulnerability in SearchBlox allows authenticated users to create multiple super admin accounts, bypassing intended business logic. It affects Sea...
Sep 6, 2023This vulnerability in TigerGraph Enterprise 3.7.0 allows any code running as the tigergraph user to write arbitrary SSH public keys to the authorized_...
Aug 14, 2023This CVE describes an authorization bypass vulnerability in alf.io event management software where attackers can manipulate user-controlled keys to ac...
Apr 24, 2023This vulnerability allows attackers to bypass authentication in Vadi Corporate Information Systems DigiKent by manipulating user-controlled keys. It a...
Mar 21, 2023This vulnerability in the WooCommerce Multiple Customer Addresses & Shipping WordPress plugin allows any authenticated user (even low-privilege subscr...
Mar 20, 2023This vulnerability allows attackers to bypass authorization controls in OpenEMR by manipulating user-controlled keys, potentially accessing unauthoriz...
Aug 15, 2022This CVE describes an Insecure Direct Object Reference vulnerability in the Advanced Forms WordPress plugin that allows authenticated attackers to cha...
Nov 23, 2021This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Siemens Teamcenter PLM software. Attackers can manipulate user-supplied...
Sep 14, 2021About CWE-639 (CWE-639)
Our database tracks 518 CVEs classified as CWE-639, with 63 rated critical and 164 rated high severity. The average CVSS score for CWE-639 vulnerabilities is 6.6.
External reference: View CWE-639 on MITRE CWE →
Monitor CWE-639 Vulnerabilities
Get alerted when new CWE-639 CVEs affect your infrastructure.
Start Monitoring Free