CWE-639: CWE-639
Yearly Trend
Top Affected Vendors
All CWE-639 CVEs (519)
The Wishlist for WooCommerce WordPress plugin has an Insecure Direct Object Reference vulnerability that allows unauthenticated attackers to modify ot...
Nov 25, 2025This vulnerability allows authenticated users in Revive Adserver to delete advertising banners belonging to other user accounts due to missing authori...
Nov 20, 2025An Insecure Direct Object Reference (IDOR) vulnerability in Rallly allows authenticated users to change other participants' display names in polls wit...
Nov 19, 2025Hospital Management System v4 has an Insecure Direct Object Reference (IDOR) vulnerability in appointment cancellation functionality. This allows atta...
Nov 18, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the Rometheme RTMKit WordPress plugin that allows attackers to bypass a...
Oct 29, 2025This vulnerability allows attackers to bypass authorization controls in AHE Mobile by manipulating user-controlled keys, potentially enabling privileg...
Sep 23, 2025This vulnerability allows attackers to bypass authorization controls in PROLIZ OBS Student Affairs Information System by manipulating user-controlled ...
Sep 22, 2025This CVE describes an authorization bypass vulnerability in Beefull Energy Technologies' Beefull App where attackers can manipulate user-controlled ke...
Sep 16, 2025An Insecure Direct Object Reference (IDOR) vulnerability in Reolink v4.54.0.4.20250526 allows unauthorized users to access and download other users' p...
Aug 22, 2025This vulnerability in flaskBlog allows any authenticated user to delete arbitrary comments belonging to other users by manipulating the commentID para...
Aug 19, 2025The femanager extension for TYPO3 contains an Insecure Direct Object Reference vulnerability that allows attackers to modify user data without proper ...
Jul 22, 2025This vulnerability in CVAT allows authenticated users with 'user' role to access other users' uploaded files during project/task backup imports by exp...
Jun 25, 2025This vulnerability in iTop allows authenticated users with portal access to view objects they shouldn't have permission to access by querying an unpro...
May 14, 2025The WordPress Simple Shopping Cart plugin has an Insecure Direct Object Reference vulnerability that allows unauthenticated attackers to access and ma...
May 1, 2025Unauthenticated attackers can trigger device actions associated with specific 'scenes' of arbitrary users, allowing them to manipulate smart home or I...
Apr 15, 2025CVE-2025-32373 is an authorization bypass vulnerability in DNN CMS where registered users can craft requests to enumerate or access portal files they ...
Apr 9, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in LibreChat's delete attachments functionality. Authenticated users can d...
Mar 20, 2025This vulnerability allows attackers to access sensitive student information by manipulating the studentId parameter in the /getStudemtAllDetailsById A...
Mar 3, 2025Coolify versions before 4.0.0-beta.361 have an authorization flaw where any authenticated user can revoke any team invitation by guessing predictable ...
Jan 24, 2025This vulnerability allows authenticated attackers in SAP Business Workflow and SAP Flexible Workflow to manipulate parameters in legitimate requests t...
Jan 14, 2025CVE-2024-9819 is an authorization bypass vulnerability in NextGeography NG Analyser that allows attackers to access functionality they shouldn't have ...
Dec 17, 2024This vulnerability in the User Meta WordPress plugin allows authenticated attackers with Contributor-level access or higher to access user meta data t...
Nov 9, 2024An Insecure Direct Object Reference (IDOR) vulnerability in lunary-ai/lunary allows authenticated users to modify other users' prompts by manipulating...
Oct 29, 2024This vulnerability allows authenticated users in self-hosted Sentry deployments to delete issue alert notifications belonging to other users if they k...
Sep 17, 2024This vulnerability allows attackers to exploit the user invitation system in lunary-ai/lunary to obtain valid JWT tokens and perform account takeover....
Sep 13, 2024This vulnerability in Reedos aiM-Star version 2.0.1 allows authenticated attackers to bypass access controls on certain API endpoints by manipulating ...
Sep 11, 2024This vulnerability allows authenticated attackers in TechExcel Back Office Software to bypass access controls on API endpoints by manipulating URL par...
Sep 9, 2024This vulnerability in lib9p's 9p authentication implementation allows an authenticated attacker to impersonate any other valid filesystem user by expl...
Aug 25, 2024This vulnerability allows attackers to bypass authorization controls in upKeeper Manager by manipulating user-controlled keys in REST API requests, po...
Aug 16, 2024This vulnerability in Apache Flink allows authenticated regular users to bypass authorization controls and access sensitive user information they shou...
Jul 22, 2024This vulnerability in ExtremePacs Extreme XDS allows attackers to bypass authorization controls by manipulating user-provided keys, potentially access...
Jul 8, 2024This vulnerability in Kiuwan SAST allows authenticated users to access information about applications they shouldn't have permission to view. The API ...
Jun 20, 2024An Insecure Direct Object Reference vulnerability in Google Cloud Looker allows authenticated users sharing the same LookML model to access metadata t...
May 22, 2024This vulnerability allows authenticated attackers with Instructor-level permissions or higher in Tutor LMS WordPress plugin to delete any course witho...
May 16, 2024An authenticated attacker can exploit an Indirect Object Reference (IDOR) vulnerability in Security Center's 'owner' parameter to escalate privileges....
Feb 23, 2026This vulnerability allows attackers to bypass authorization controls by manipulating user-controlled variables in Farktor Software's E-Commerce Packag...
Feb 12, 2026This vulnerability in Nextcloud Tables allows authenticated malicious users to move columns they created into other users' tables without authorizatio...
Dec 5, 2025This vulnerability in PosCube Assist software allows attackers to bypass authentication using hard-coded credentials or user-controlled keys. It affec...
Oct 2, 2025TrueFiling, a cloud-hosted electronic filing system for legal documentation, had an authorization bypass vulnerability where authenticated users could...
Jan 17, 2025This CVE describes an authorization bypass vulnerability in Logo Software Inc.'s Logo Cloud platform where attackers can access resources by manipulat...
Oct 6, 2025An improper authorization vulnerability in RICOH Streamline NX allows man-in-the-middle attackers to retrieve user registration information and OIDC t...
Jan 9, 2026This vulnerability involves insecure handling of SSH keys during client bootstrap processes, allowing local attackers to potentially access these keys...
Oct 16, 2024This CVE describes an insecure direct object reference vulnerability where non-admin users can modify or delete data objects they shouldn't have acces...
Feb 10, 2026This vulnerability allows attackers to bypass authorization controls in QR Menu Pro Smart Menu Systems Menu Panel by manipulating user-controlled iden...
Jan 29, 2026This vulnerability allows an attacker with local access and arbitrary code execution privileges in AMD's Secure Processor (ASP) to extract cryptograph...
Aug 13, 2024This vulnerability allows attackers to bypass authorization controls in VHS Electronic Software's ACE Center by manipulating user-controlled keys, pot...
Oct 20, 2025This CVE describes an authorization bypass vulnerability in Academy LMS WordPress plugin where attackers can access unauthorized resources by manipula...
Sep 22, 2025This vulnerability allows authenticated regular users in Vaultwarden to access other users' encrypted password vault entries by exploiting an authoriz...
Mar 4, 2026Tronclass by WisdomGarden has an Insecure Direct Object Reference (IDOR) vulnerability that allows authenticated attackers to join any course by manip...
Feb 23, 2026This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the PawFriends WordPress theme that allows attackers to bypass authoriz...
Feb 20, 2026About CWE-639 (CWE-639)
Our database tracks 519 CVEs classified as CWE-639, with 63 rated critical and 165 rated high severity. The average CVSS score for CWE-639 vulnerabilities is 6.6.
External reference: View CWE-639 on MITRE CWE →
Monitor CWE-639 Vulnerabilities
Get alerted when new CWE-639 CVEs affect your infrastructure.
Start Monitoring Free