CWE-639: CWE-639
Yearly Trend
Top Affected Vendors
All CWE-639 CVEs (519)
The WPC Smart Quick View for WooCommerce WordPress plugin has an information disclosure vulnerability that allows unauthenticated attackers to access ...
Oct 18, 2025The WPC Smart Wishlist for WooCommerce WordPress plugin has an Insecure Direct Object Reference vulnerability that allows unauthenticated attackers to...
Oct 11, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the Stylemix Motors WordPress plugin that allows attackers to bypass au...
Aug 14, 2025The Free Booking Plugin for WordPress is vulnerable to Insecure Direct Object Reference (IDOR) allowing unauthenticated attackers to view any booking ...
May 31, 2025This vulnerability allows unauthenticated attackers to access appointment details including customer names and email addresses through the LatePoint W...
May 14, 2025An unauthenticated attacker can access other users' charger information through an authorization bypass vulnerability. This affects systems with vulne...
Apr 15, 2025This vulnerability allows unauthenticated attackers to enumerate smart devices by querying an unprotected API with a known username. It affects system...
Apr 15, 2025An unauthenticated attacker can retrieve EV charger version information and firmware upgrade history by knowing the charger's identifier. This informa...
Apr 15, 2025Unauthenticated attackers can rename rooms belonging to arbitrary users in affected systems. This authorization bypass vulnerability allows attackers ...
Apr 15, 2025This vulnerability allows an attacker to export other users' plant information from affected systems, potentially exposing sensitive operational data....
Apr 15, 2025This vulnerability allows unauthenticated attackers to enumerate smart devices by knowing a valid username. It affects systems that expose smart devic...
Apr 15, 2025This vulnerability allows unauthenticated attackers to retrieve a user's plant list by simply knowing their username. It affects systems using vulnera...
Apr 15, 2025An unauthenticated attacker can retrieve smart meter serial numbers using only the owner's username, bypassing authentication requirements. This affec...
Apr 15, 2025Unauthenticated attackers can access information about smart device collections (rooms) that should be restricted. This affects systems running vulner...
Apr 15, 2025This vulnerability allows unauthenticated attackers to determine which usernames exist in a system by querying a specific API. This affects systems ru...
Apr 15, 2025An improper access control vulnerability in LibreChat allows authenticated users to delete other users' prompts by manipulating the groupid parameter....
Mar 20, 2025This vulnerability allows unauthenticated attackers to upload arbitrary images to WordPress listings via the Business Directory Plugin. All WordPress ...
Mar 13, 2025This vulnerability in GitLab Enterprise Edition allows Guest users to read Security policy YAML files, potentially exposing sensitive security configu...
Mar 3, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the Amelia WordPress booking plugin. Attackers can bypass authorization...
Feb 25, 2025This vulnerability allows unauthenticated attackers to download user resumes without authorization in the WP Job Portal WordPress plugin. It affects a...
Feb 1, 2025This vulnerability allows unauthenticated attackers to delete arbitrary company logos in the WP Job Portal WordPress plugin due to missing validation ...
Feb 1, 2025The Post Duplicator WordPress plugin allows authenticated attackers with Contributor-level access or higher to duplicate password-protected, private, ...
Jan 11, 2025This vulnerability in the WordPress Content No Cache plugin allows unauthenticated attackers to access password-protected, private, or draft posts tha...
Dec 24, 2024The Cowidgets – Elementor Addons WordPress plugin has an information exposure vulnerability that allows authenticated attackers with Contributor-lev...
Nov 9, 2024This vulnerability in the Aimeos frontend controller package allows attackers to disable subscriptions and reviews belonging to other customers throug...
Sep 26, 2024This vulnerability allows attackers to bypass authorization controls in Propovoice CRM by manipulating user-controlled keys, enabling unauthorized acc...
Aug 18, 2024This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the KiviCare WordPress plugin. It allows authenticated users to bypass ...
Jun 8, 2024This vulnerability allows attackers to bypass authorization controls in the SEOPress WordPress plugin by manipulating user-controlled keys. It affects...
May 6, 2024CVE-2023-24842 is an insufficient access control vulnerability in HGiga MailSherlock that allows unauthenticated remote attackers to view other users'...
Mar 27, 2023An Insecure Direct Object Reference (IDOR) vulnerability in BlackBerry AtHoc Management Console version 7.21 allows attackers to access information ab...
Nov 19, 2025This vulnerability allows remote attackers with low-privilege accounts to bypass authorization controls and read sensitive data via crafted HTTP reque...
Sep 10, 2024This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the JobBoard Job Listing WordPress plugin that allows attackers to bypa...
Apr 1, 2025This vulnerability involves locale-specific case conversion inconsistencies in Java's String.toLowerCase() and String.toUpperCase() methods, which can...
Dec 2, 2024CVE-2025-0670 is an authorization bypass vulnerability in Akinsoft ProKuafor software that allows attackers to access resources by manipulating user-c...
Sep 2, 2025CVE-2025-0640 is an authorization bypass vulnerability in Akinsoft OctoCloud that allows attackers to access resources they shouldn't have permission ...
Sep 2, 2025This vulnerability allows a high-privileged attacker with local access to bypass authorization controls in Dell PowerScale OneFS, potentially gaining ...
Oct 8, 2025This CVE describes an authorization bypass vulnerability in Akbim Software Online Exam Registration where attackers can manipulate user-controlled key...
Jul 21, 2025An authenticated attacker can bypass pipeline authorization controls in GitLab by using specially crafted naming conventions. This vulnerability affec...
May 23, 2024The Booking Calendar plugin for WordPress has an Insecure Direct Object Reference vulnerability that allows authenticated attackers with Subscriber-le...
Feb 18, 2026This vulnerability allows authenticated Kanboard users to access swimlane data from projects they shouldn't have permission to view. It affects all Ka...
Feb 10, 2026This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to modify other users' membership payment data in the W...
Feb 10, 2026This vulnerability in OpenProject allows authenticated attackers to move meeting agenda items into different meetings they shouldn't have access to, p...
Feb 6, 2026This vulnerability allows authenticated WordPress users with Author-level permissions or higher to access private timeline content they shouldn't see....
Feb 6, 2026This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to disable Google Authenticator two-factor authenticati...
Jan 16, 2026A vulnerability in NetApp ONTAP with snapshot locking enabled allows privileged remote attackers to set snapshot expiry times to 'none', potentially p...
Jan 12, 2026This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the Wptexture Image Slider Slideshow WordPress plugin. Attackers can by...
Jan 8, 2026The ACF to REST API WordPress plugin has an insecure direct object reference vulnerability that allows authenticated users with Contributor-level acce...
Jan 7, 2026This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the YoOhw Studio Order Cancellation & Returns for WooCommerce WordPress...
Dec 31, 2025This CVE describes an authorization bypass vulnerability in the Crocoblock JetPopup WordPress plugin where attackers can manipulate user-controlled ke...
Dec 29, 2025The WP JobHunt plugin for WordPress (used by JobCareer theme) has an Insecure Direct Object Reference vulnerability that allows authenticated attacker...
Dec 20, 2025About CWE-639 (CWE-639)
Our database tracks 519 CVEs classified as CWE-639, with 63 rated critical and 165 rated high severity. The average CVSS score for CWE-639 vulnerabilities is 6.6.
External reference: View CWE-639 on MITRE CWE →
Monitor CWE-639 Vulnerabilities
Get alerted when new CWE-639 CVEs affect your infrastructure.
Start Monitoring Free