CWE-639: CWE-639

518
Total CVEs
63
Critical
164
High
6.6
Avg CVSS

Yearly Trend

2026
88
2025
239
2024
130
2023
28
2022
16

Top Affected Vendors

1 Growatt 12
2 Nextcloud 10
3 Easyappointments 8
4 Liferay 8
5 Boldworkplanner 8
6 Lunary 6
7 Gitlab 6
8 Open Emr 5
9 Wpjobportal 5
10 Apache 4

All CWE-639 CVEs (518)

CVE-2023-38050
9.1

This CVE describes a Broken Object Level Authorization (BOLA) vulnerability in Easy!Appointments webhook endpoints that allows low-privileged authenti...

Jul 9, 2024
CVE-2024-2472
9.1

The LatePoint Plugin for WordPress has an authorization bypass vulnerability that allows unauthenticated attackers to access other customers' personal...

Jun 14, 2024
CVE-2019-19755
9.1

This vulnerability allows attackers to perform man-in-the-middle attacks on SSH connections to ethOS mining rigs and easily identify all public IPv4 n...

Apr 30, 2024
CVE-2024-33668
9.1

This vulnerability in Zammad allows attackers to brute-force guessable FormIDs used in the upload cache, enabling them to inject malicious content int...

Apr 26, 2024
CVE-2024-31815
9.1

This vulnerability allows unauthenticated attackers to download the configuration file from TOTOLINK EX200 routers via a specific CGI script. This exp...

Apr 8, 2024
CVE-2024-31095
9.1

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the WordPress Thumbs Rating plugin. It allows attackers to bypass autho...

Mar 31, 2024
CVE-2024-27302
9.1

This CVE describes a CORS bypass vulnerability in go-zero web framework where the `isOriginAllowed` function uses `strings.HasSuffix` to validate orig...

Mar 6, 2024
CVE-2023-6144
9.1

CVE-2023-6144 is an authentication bypass vulnerability in Dev Blog v1.0 that allows attackers to take over any user account by manipulating the 'user...

Nov 21, 2023
CVE-2023-44981
9.1

This CVE describes an authorization bypass vulnerability in Apache ZooKeeper when SASL Quorum Peer authentication is enabled. An attacker can join the...

Oct 11, 2023
CVE-2023-44206
9.1

CVE-2023-44206 is an authorization bypass vulnerability in Acronis Cyber Protect 15 that allows attackers to access and manipulate sensitive informati...

Sep 27, 2023
CVE-2022-1165
9.1

The Blackhole for Bad Bots WordPress plugin before version 3.3.2 uses untrusted HTTP headers to determine client IP addresses, allowing attackers to s...

Apr 4, 2022
CVE-2022-0686
9.1

CVE-2022-0686 is an authorization bypass vulnerability in the url-parse npm package where attackers can manipulate URL parsing to bypass authenticatio...

Feb 20, 2022
CVE-2025-27507
9.0

Zitadel's Admin API contains Insecure Direct Object Reference (IDOR) vulnerabilities that allow authenticated users without proper IAM roles to modify...

Mar 4, 2025
CVE-2025-15096
8.8

The Videospirecore Theme Plugin for WordPress has an authentication bypass vulnerability that allows authenticated attackers with Subscriber-level acc...

Feb 11, 2026
CVE-2026-25497
8.8

This CVE describes a privilege escalation vulnerability in Craft CMS's GraphQL API where authenticated users with write access to one asset volume can...

Feb 9, 2026
CVE-2026-23754
8.8

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in D-Link D-View 8 network management software. Any authenticated user can...

Jan 21, 2026
CVE-2025-69274
8.8

An authorization bypass vulnerability in Broadcom DX NetOps Spectrum allows attackers to escalate privileges by manipulating user-controlled keys. Thi...

Jan 12, 2026
CVE-2025-34436
8.8

AVideo versions before 20.1 contain an insecure direct object reference vulnerability that allows any authenticated user to upload files into other us...

Dec 17, 2025
CVE-2025-34437
8.8

This vulnerability allows any authenticated user to upload comment images to videos owned by other users in AVideo. Attackers can perform unauthorized...

Dec 17, 2025
CVE-2025-6038
8.8

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to change passwords of any user, including administrato...

Oct 9, 2025
CVE-2025-7718
8.8

This vulnerability allows authenticated attackers with Subscriber-level access or higher to change arbitrary users' email addresses, including adminis...

Sep 10, 2025
CVE-2025-7049
8.8

The WPGYM WordPress plugin has a privilege escalation vulnerability that allows authenticated attackers with Subscriber-level access or higher to modi...

Sep 10, 2025
CVE-2025-4796
8.8

The Eventin WordPress plugin has a privilege escalation vulnerability that allows attackers with contributor-level permissions or higher to change any...

Aug 8, 2025
CVE-2025-46386
8.8

CVE-2025-46386 is an authorization bypass vulnerability where attackers can manipulate user-controlled keys to access unauthorized resources. This aff...

Aug 6, 2025
CVE-2025-3610
8.8

The Reales WP STPT WordPress plugin allows authenticated attackers with subscriber-level access to change arbitrary users' passwords and email address...

May 6, 2025
CVE-2025-1667
8.8

This vulnerability allows authenticated attackers with teacher-level access or higher in the WPSchoolPress WordPress plugin to escalate privileges by ...

Mar 15, 2025
CVE-2024-53406
8.8

CVE-2024-53406 is an authentication bypass vulnerability in Espressif ESP-IDF v5.3.0 where the device reuses session keys during reconnection, allowin...

Mar 13, 2025
CVE-2024-34520
8.8

An authorization bypass vulnerability in Mavenir SCE Application Provisioning Portal allows authenticated 'guest' users to perform administrative acti...

Feb 12, 2025
CVE-2024-10497
8.8

This CVE describes an authorization bypass vulnerability in Schneider Electric devices where authenticated attackers can manipulate HTTPS requests to ...

Jan 17, 2025
CVE-2024-13040
8.8

This vulnerability in QOCA aim software allows remote attackers with regular user privileges to bypass authorization controls by manipulating user ID ...

Dec 31, 2024
CVE-2024-48217
8.8

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in SiSMART v7.4.0 dashboard that allows attackers to access other users' d...

Nov 1, 2024
CVE-2024-9215
8.8

This vulnerability in the PublishPress Authors WordPress plugin allows authenticated attackers with Author-level access or higher to modify arbitrary ...

Oct 17, 2024
CVE-2024-9687
8.8

The WP 2FA with Telegram plugin for WordPress has an authentication bypass vulnerability that allows authenticated attackers with subscriber-level per...

Oct 15, 2024
CVE-2024-8290
8.8

This vulnerability allows authenticated WordPress users with subscriber or customer permissions to modify administrator email addresses via an insecur...

Sep 25, 2024
CVE-2024-8428
8.8

This vulnerability allows authenticated WordPress users with subscriber-level access or higher to escalate privileges by changing administrative user ...

Sep 6, 2024
CVE-2024-5128
8.8

This IDOR vulnerability in lunary-ai/lunary allows unauthorized users to view, modify, or delete any dataset_prompt or dataset_prompt_variation across...

Jun 6, 2024
CVE-2023-6724
8.8

This vulnerability allows attackers to bypass authorization controls in the Hearing Tracking System by manipulating user-controlled keys, enabling aut...

Feb 9, 2024
CVE-2023-6515
8.8

This CVE describes an authorization bypass vulnerability in Mia Technology's MİA-MED software where attackers can manipulate user-controlled keys to ...

Feb 8, 2024
CVE-2023-45380
8.8

This vulnerability in the PrestaShop 'Order Duplicator' module allows unauthenticated guests to download customer personal information including names...

Nov 7, 2023
CVE-2023-46478
8.8

This vulnerability allows remote attackers to execute arbitrary code on systems running minCal v1.0.0 by sending a specially crafted script to the cus...

Oct 30, 2023
CVE-2023-4101
8.8

This vulnerability in QSige login SSO allows authenticated users to access resources without proper permission checks. Attackers who have valid login ...

Oct 3, 2023
CVE-2023-4213
8.8

The Simplr Registration Form Plus+ WordPress plugin has an insecure direct object reference vulnerability that allows authenticated users with subscri...

Sep 13, 2023
CVE-2020-10130
8.8

This vulnerability in SearchBlox allows authenticated users to create multiple super admin accounts, bypassing intended business logic. It affects Sea...

Sep 6, 2023
CVE-2023-28481
8.8

This vulnerability in TigerGraph Enterprise 3.7.0 allows any code running as the tigergraph user to write arbitrary SSH public keys to the authorized_...

Aug 14, 2023
CVE-2023-2260
8.8

This CVE describes an authorization bypass vulnerability in alf.io event management software where attackers can manipulate user-controlled keys to ac...

Apr 24, 2023
CVE-2023-1462
8.8

This vulnerability allows attackers to bypass authentication in Vadi Corporate Information Systems DigiKent by manipulating user-controlled keys. It a...

Mar 21, 2023
CVE-2023-0865
8.8

This vulnerability in the WooCommerce Multiple Customer Addresses & Shipping WordPress plugin allows any authenticated user (even low-privilege subscr...

Mar 20, 2023
CVE-2022-2824
8.8

This vulnerability allows attackers to bypass authorization controls in OpenEMR by manipulating user-controlled keys, potentially accessing unauthoriz...

Aug 15, 2022
CVE-2021-24892
8.8

This CVE describes an Insecure Direct Object Reference vulnerability in the Advanced Forms WordPress plugin that allows authenticated attackers to cha...

Nov 23, 2021
CVE-2021-40355
8.8

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Siemens Teamcenter PLM software. Attackers can manipulate user-supplied...

Sep 14, 2021

About CWE-639 (CWE-639)

Our database tracks 518 CVEs classified as CWE-639, with 63 rated critical and 164 rated high severity. The average CVSS score for CWE-639 vulnerabilities is 6.6.

External reference: View CWE-639 on MITRE CWE →

Monitor CWE-639 Vulnerabilities

Get alerted when new CWE-639 CVEs affect your infrastructure.

Start Monitoring Free