CWE-639: CWE-639
Yearly Trend
Top Affected Vendors
All CWE-639 CVEs (519)
This vulnerability allows attackers to bypass authorization controls in RadiusTheme Radius Blocks WordPress plugin by manipulating user-controlled key...
Dec 18, 2025This vulnerability in the HUSKY – Products Filter Professional for WooCommerce WordPress plugin allows authenticated attackers with subscriber-level...
Dec 18, 2025InvoicePlane versions before commit debb446c are vulnerable to an authorization bypass that allows users to view invoices belonging to other accounts....
Dec 16, 2025Nextcloud Server 30.0.0 contains an Insecure Direct Object Reference (IDOR) vulnerability in the /core/preview endpoint. Authenticated users can acces...
Dec 12, 2025The Ultra Addons for Contact Form 7 WordPress plugin has an authorization bypass vulnerability that allows authenticated users with Subscriber-level a...
Dec 12, 2025This vulnerability allows authenticated users in GroupSession to modify memo fields in Circular notices that should be non-editable due to improper au...
Dec 12, 2025This vulnerability allows authenticated GitLab users to access sensitive information from private projects by crafting specific GraphQL queries. It af...
Dec 11, 2025This vulnerability allows attackers to bypass authorization mechanisms by manipulating user-controlled keys in DijiDemi software, potentially accessin...
Dec 10, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the ThimPress Thim Elementor Kit WordPress plugin. Attackers can bypass...
Dec 9, 2025CVE-2025-66553 is an authorization bypass vulnerability in Nextcloud Tables where authenticated users can view metadata of columns in other tables by ...
Dec 5, 2025Nextcloud Tables had an authorization bypass vulnerability where unprivileged users could view which tables were shared with which groups/users and th...
Dec 5, 2025This vulnerability allows non-privileged Nextcloud users to modify tags on files they shouldn't have access to through bulk tagging operations. It aff...
Dec 5, 2025This vulnerability in the HUSKY – Products Filter Professional for WooCommerce WordPress plugin allows authenticated attackers with subscriber-level...
Dec 3, 2025Grav CMS versions before 1.8.0-beta.27 contain an IDOR vulnerability in the admin panel that allows low-privilege users to access sensitive informatio...
Dec 1, 2025This IDOR vulnerability in classroomio 0.1.13 allows students to temporarily access admin/teacher endpoints by manipulating course IDs in URLs, leadin...
Nov 26, 2025This vulnerability allows unauthenticated attackers to impersonate any WordPress user and inject arbitrary messages into WooCommerce order conversatio...
Nov 25, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to rename files uploaded by other users via the Fronten...
Nov 25, 2025The ELEX WordPress HelpDesk plugin has an Insecure Direct Object Reference vulnerability that allows authenticated users with Subscriber-level access ...
Nov 21, 2025This vulnerability in the Return Refund and Exchange For WooCommerce WordPress plugin allows authenticated attackers with Subscriber-level access or h...
Nov 21, 2025This vulnerability allows authenticated WordPress users with Author-level permissions or higher to replace media files belonging to other users, inclu...
Nov 13, 2025This vulnerability allows authenticated WordPress users with author-level permissions or higher to attach arbitrary image files to any location within...
Nov 12, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to delete wishlist items from other users' wishlists. I...
Nov 12, 2025The Groups plugin for WordPress has an Insecure Direct Object Reference vulnerability that allows authenticated attackers with Subscriber-level access...
Nov 8, 2025This vulnerability allows authenticated WordPress users with subscriber-level access or higher to manipulate other users' time clock entries by exploi...
Oct 22, 2025The Flexible Refund and Return Order for WooCommerce WordPress plugin has an authorization flaw that allows authenticated users (even with basic subsc...
Oct 22, 2025The Moodle OpenAI Chat Block plugin has an Insecure Direct Object Reference vulnerability that allows authenticated students to impersonate other user...
Oct 21, 2025The Quick Featured Images WordPress plugin has an Insecure Direct Object Reference vulnerability that allows authenticated attackers with Author-level...
Oct 15, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Liferay Portal and DXP that allows authenticated users in one virtual i...
Oct 13, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Liferay DXP that allows authenticated users from one virtual instance t...
Oct 13, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Liferay Portal and DXP that allows authenticated users to access other ...
Oct 13, 2025IMPAQTR Aurora versions before 1.36 contain an Insecure Direct Object Reference (IDOR) vulnerability that allows authenticated users to access other u...
Oct 1, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in Liferay Portal and DXP that allows authenticated users from one virtual...
Sep 30, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner software that allows authenticated users to access con...
Sep 30, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner software. Authenticated users can access planning coun...
Sep 30, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner software that allows authenticated users to access con...
Sep 30, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner software that allows authenticated users to access bas...
Sep 30, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner that allows authenticated users to access calendar det...
Sep 30, 2025This IDOR vulnerability in BOLD Workplanner allows authenticated users to access time records details using unauthorized internal identifiers due to i...
Sep 30, 2025An Insecure Direct Object Reference (IDOR) vulnerability in BOLD Workplanner allows authenticated users to access basic contract details using unautho...
Sep 30, 2025An Insecure Direct Object Reference (IDOR) vulnerability in Liferay Portal and DXP allows authenticated users from one virtual instance to add notes t...
Sep 22, 2025An insecure direct object reference (IDOR) vulnerability in Liferay's Contacts Center widget allows remote attackers to access contact information the...
Sep 19, 2025CVE-2025-10719 is an Insecure Direct Object Reference vulnerability in Tronclass by WisdomGarden that allows authenticated users to access other users...
Sep 19, 2025An Insecure Direct Object Reference (IDOR) vulnerability in Liferay Portal and DXP allows authenticated users to access workflow definitions by name v...
Sep 11, 2025This vulnerability allows attackers to bypass authorization controls in wpForo Forum by manipulating user-controlled keys, potentially accessing unaut...
Sep 3, 2025PHPGurukul Employee Leave Management System 2.1 contains an Insecure Direct Object Reference (IDOR) vulnerability where authenticated users can manipu...
Sep 2, 2025An authenticated SOGo Webmail user can send emails impersonating other users by manipulating sender identifiers in email requests. This IDOR vulnerabi...
Aug 4, 2025This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the eyecix JobSearch WordPress plugin that allows attackers to bypass a...
Jun 20, 2025The Homey WordPress theme has an Insecure Direct Object Reference vulnerability that allows authenticated attackers with Subscriber-level access or hi...
May 2, 2025This vulnerability in Moodle allows unauthorized users to access RSS feeds due to insufficient permission checks. Any Moodle instance with RSS feeds e...
Apr 25, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to view other users' invoices and orders containing sen...
Apr 24, 2025About CWE-639 (CWE-639)
Our database tracks 519 CVEs classified as CWE-639, with 63 rated critical and 165 rated high severity. The average CVSS score for CWE-639 vulnerabilities is 6.6.
External reference: View CWE-639 on MITRE CWE →
Monitor CWE-639 Vulnerabilities
Get alerted when new CWE-639 CVEs affect your infrastructure.
Start Monitoring Free