CWE-639: CWE-639

519
Total CVEs
63
Critical
165
High
6.6
Avg CVSS

Yearly Trend

2026
89
2025
239
2024
130
2023
28
2022
16

Top Affected Vendors

1 Growatt 12
2 Nextcloud 10
3 Easyappointments 8
4 Liferay 8
5 Boldworkplanner 8
6 Lunary 6
7 Gitlab 6
8 Open Emr 5
9 Wpjobportal 5
10 Apache 4

All CWE-639 CVEs (519)

CVE-2025-12040
6.5

The Wishlist for WooCommerce WordPress plugin has an Insecure Direct Object Reference vulnerability that allows unauthenticated attackers to modify ot...

Nov 25, 2025
CVE-2025-52670
6.5

This vulnerability allows authenticated users in Revive Adserver to delete advertising banners belonging to other user accounts due to missing authori...

Nov 20, 2025
CVE-2025-65032
6.5

An Insecure Direct Object Reference (IDOR) vulnerability in Rallly allows authenticated users to change other participants' display names in polls wit...

Nov 19, 2025
CVE-2025-63513
6.5

Hospital Management System v4 has an Insecure Direct Object Reference (IDOR) vulnerability in appointment cancellation functionality. This allows atta...

Nov 18, 2025
CVE-2025-64283
6.5

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the Rometheme RTMKit WordPress plugin that allows attackers to bypass a...

Oct 29, 2025
CVE-2025-9342
6.5

This vulnerability allows attackers to bypass authorization controls in AHE Mobile by manipulating user-controlled keys, potentially enabling privileg...

Sep 23, 2025
CVE-2025-0875
6.5

This vulnerability allows attackers to bypass authorization controls in PROLIZ OBS Student Affairs Information System by manipulating user-controlled ...

Sep 22, 2025
CVE-2025-7355
6.5

This CVE describes an authorization bypass vulnerability in Beefull Energy Technologies' Beefull App where attackers can manipulate user-controlled ke...

Sep 16, 2025
CVE-2025-55621
6.5

An Insecure Direct Object Reference (IDOR) vulnerability in Reolink v4.54.0.4.20250526 allows unauthorized users to access and download other users' p...

Aug 22, 2025
CVE-2025-55737
6.5

This vulnerability in flaskBlog allows any authenticated user to delete arbitrary comments belonging to other users by manipulating the commentID para...

Aug 19, 2025
CVE-2025-7900
6.5

The femanager extension for TYPO3 contains an Insecure Direct Object Reference vulnerability that allows attackers to modify user data without proper ...

Jul 22, 2025
CVE-2025-49135
6.5

This vulnerability in CVAT allows authenticated users with 'user' role to access other users' uploaded files during project/task backup imports by exp...

Jun 25, 2025
CVE-2024-52601
6.5

This vulnerability in iTop allows authenticated users with portal access to view objects they shouldn't have permission to access by querying an unpro...

May 14, 2025
CVE-2025-3874
6.5

The WordPress Simple Shopping Cart plugin has an Insecure Direct Object Reference vulnerability that allows unauthenticated attackers to access and ma...

May 1, 2025
CVE-2025-31360
6.5

Unauthenticated attackers can trigger device actions associated with specific 'scenes' of arbitrary users, allowing them to manipulate smart home or I...

Apr 15, 2025
CVE-2025-32373
6.5

CVE-2025-32373 is an authorization bypass vulnerability in DNN CMS where registered users can craft requests to enumerate or access portal files they ...

Apr 9, 2025
CVE-2024-10366
6.5

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in LibreChat's delete attachments functionality. Authenticated users can d...

Mar 20, 2025
CVE-2025-25952
6.5

This vulnerability allows attackers to access sensitive student information by manipulating the studentId parameter in the /getStudemtAllDetailsById A...

Mar 3, 2025
CVE-2025-22608
6.5

Coolify versions before 4.0.0-beta.361 have an authorization flaw where any authenticated user can revoke any team invitation by guessing predictable ...

Jan 24, 2025
CVE-2025-0058
6.5

This vulnerability allows authenticated attackers in SAP Business Workflow and SAP Flexible Workflow to manipulate parameters in legitimate requests t...

Jan 14, 2025
CVE-2024-9819
6.5

CVE-2024-9819 is an authorization bypass vulnerability in NextGeography NG Analyser that allows attackers to access functionality they shouldn't have ...

Dec 17, 2024
CVE-2024-9262
6.5

This vulnerability in the User Meta WordPress plugin allows authenticated attackers with Contributor-level access or higher to access user meta data t...

Nov 9, 2024
CVE-2024-7473
6.5

An Insecure Direct Object Reference (IDOR) vulnerability in lunary-ai/lunary allows authenticated users to modify other users' prompts by manipulating...

Oct 29, 2024
CVE-2024-45605
6.5

This vulnerability allows authenticated users in self-hosted Sentry deployments to delete issue alert notifications belonging to other users if they k...

Sep 17, 2024
CVE-2024-6087
6.5

This vulnerability allows attackers to exploit the user invitation system in lunary-ai/lunary to obtain valid JWT tokens and perform account takeover....

Sep 13, 2024
CVE-2024-45786
6.5

This vulnerability in Reedos aiM-Star version 2.0.1 allows authenticated attackers to bypass access controls on certain API endpoints by manipulating ...

Sep 11, 2024
CVE-2024-8601
6.5

This vulnerability allows authenticated attackers in TechExcel Back Office Software to bypass access controls on API endpoints by manipulating URL par...

Sep 9, 2024
CVE-2024-8158
6.5

This vulnerability in lib9p's 9p authentication implementation allows an authenticated attacker to impersonate any other valid filesystem user by expl...

Aug 25, 2024
CVE-2024-42464
6.5

This vulnerability allows attackers to bypass authorization controls in upKeeper Manager by manipulating user-controlled keys in REST API requests, po...

Aug 16, 2024
CVE-2024-34457
6.5

This vulnerability in Apache Flink allows authenticated regular users to bypass authorization controls and access sensitive user information they shou...

Jul 22, 2024
CVE-2024-4341
6.5

This vulnerability in ExtremePacs Extreme XDS allows attackers to bypass authorization controls by manipulating user-provided keys, potentially access...

Jul 8, 2024
CVE-2023-49112
6.5

This vulnerability in Kiuwan SAST allows authenticated users to access information about applications they shouldn't have permission to view. The API ...

Jun 20, 2024
CVE-2024-5166
6.5

An Insecure Direct Object Reference vulnerability in Google Cloud Looker allows authenticated users sharing the same LookML model to access metadata t...

May 22, 2024
CVE-2024-4279
6.5

This vulnerability allows authenticated attackers with Instructor-level permissions or higher in Tutor LMS WordPress plugin to delete any course witho...

May 16, 2024
CVE-2026-2697
6.3

An authenticated attacker can exploit an Indirect Object Reference (IDOR) vulnerability in Security Center's 'owner' parameter to escalate privileges....

Feb 23, 2026
CVE-2025-13004
6.3

This vulnerability allows attackers to bypass authorization controls by manipulating user-controlled variables in Farktor Software's E-Commerce Packag...

Feb 12, 2026
CVE-2025-66551
6.3

This vulnerability in Nextcloud Tables allows authenticated malicious users to move columns they created into other users' tables without authorizatio...

Dec 5, 2025
CVE-2025-0642
6.3

This vulnerability in PosCube Assist software allows attackers to bypass authentication using hard-coded credentials or user-controlled keys. It affec...

Oct 2, 2025
CVE-2024-11146
6.3

TrueFiling, a cloud-hosted electronic filing system for legal documentation, had an authorization bypass vulnerability where authenticated users could...

Jan 17, 2025
CVE-2025-0606
6.0

This CVE describes an authorization bypass vulnerability in Logo Software Inc.'s Logo Cloud platform where attackers can access resources by manipulat...

Oct 6, 2025
CVE-2026-21409
5.9

An improper authorization vulnerability in RICOH Streamline NX allows man-in-the-middle attackers to retrieve user registration information and OIDC t...

Jan 9, 2026
CVE-2023-32189
5.9

This vulnerability involves insecure handling of SSH keys during client bootstrap processes, allowing local attackers to potentially access these keys...

Oct 16, 2024
CVE-2025-12063
5.7

This CVE describes an insecure direct object reference vulnerability where non-admin users can modify or delete data objects they shouldn't have acces...

Feb 10, 2026
CVE-2025-7013
5.7

This vulnerability allows attackers to bypass authorization controls in QR Menu Pro Smart Menu Systems Menu Panel by manipulating user-controlled iden...

Jan 29, 2026
CVE-2024-21981
5.7

This vulnerability allows an attacker with local access and arbitrary code execution privileges in AMD's Secure Processor (ASP) to extract cryptograph...

Aug 13, 2024
CVE-2025-8884
5.5

This vulnerability allows attackers to bypass authorization controls in VHS Electronic Software's ACE Center by manipulating user-controlled keys, pot...

Oct 20, 2025
CVE-2025-59562
5.5

This CVE describes an authorization bypass vulnerability in Academy LMS WordPress plugin where attackers can access unauthorized resources by manipula...

Sep 22, 2025
CVE-2026-27898
5.4

This vulnerability allows authenticated regular users in Vaultwarden to access other users' encrypted password vault entries by exploiting an authoriz...

Mar 4, 2026
CVE-2026-2997
5.4

Tronclass by WisdomGarden has an Insecure Direct Object Reference (IDOR) vulnerability that allows authenticated attackers to join any course by manip...

Feb 23, 2026
CVE-2026-22383
5.4

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the PawFriends WordPress theme that allows attackers to bypass authoriz...

Feb 20, 2026

About CWE-639 (CWE-639)

Our database tracks 519 CVEs classified as CWE-639, with 63 rated critical and 165 rated high severity. The average CVSS score for CWE-639 vulnerabilities is 6.6.

External reference: View CWE-639 on MITRE CWE →

Monitor CWE-639 Vulnerabilities

Get alerted when new CWE-639 CVEs affect your infrastructure.

Start Monitoring Free