CWE-862: Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

2,985
Total CVEs
211
Critical
809
High
6.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
435
2025
1,552
2024
754
2023
138
2022
51

Top Affected Vendors

1 Google 103
2 Sap 30
3 Apple 27
4 Jenkins 22
5 Gitlab 16
6 Xwiki 12
7 Themeum 12
8 Q Free 11
9 Wpdeveloper 11
10 Oracle 9

All Missing Authorization CVEs (2,985)

CVE-2025-45854
EPSS 16.8% 10.0

CVE-2025-45854 is a critical remote code execution vulnerability in JEHC-BPM 2.0.1 that allows attackers to execute arbitrary commands via the /server...

Jun 3, 2025
CVE-2025-22609
10.0

This vulnerability allows any authenticated user in Coolify to attach existing private SSH keys to their own server configuration. If the attacker's s...

Jan 24, 2025
CVE-2024-52416
10.0

This critical vulnerability in the WordPress Debug Tool plugin allows attackers to upload malicious web shell files to web servers without proper auth...

Nov 16, 2024
CVE-2024-6500
10.0

This vulnerability allows unauthenticated attackers to read and delete arbitrary files on WordPress sites using vulnerable InPost plugins. On Windows ...

Aug 17, 2024
CVE-2024-6071
10.0

CVE-2024-6071 is a critical remote code execution vulnerability in PTC Creo Elements/Direct License Server that allows unauthenticated attackers to ex...

Jun 27, 2024
CVE-2022-0543
10.0

CVE-2022-0543 is a critical Lua sandbox escape vulnerability in Redis on Debian-based systems that allows remote attackers to execute arbitrary code. ...

Feb 18, 2022
CVE-2026-29789
9.9

This vulnerability allows authenticated attackers with workflow write access in one project to create and manage sites on servers belonging to other p...

Mar 6, 2026
CVE-2026-0488
9.9

An authenticated attacker in SAP CRM and SAP S/4HANA can exploit a flaw in the Scripting Editor's generic function module to execute arbitrary SQL sta...

Feb 10, 2026
CVE-2025-68270
9.9

This vulnerability in Open edX Platform allows CourseLimitedStaffRole users to access and edit courses in Studio when granted organization-level permi...

Dec 16, 2025
CVE-2025-22611
9.9

This vulnerability in Coolify allows any authenticated user to escalate privileges to any role, including owner, and remove all other team members. At...

Jan 24, 2025
CVE-2024-57726
9.9

SimpleHelp remote support software versions 5.5.7 and earlier contain an authorization vulnerability where low-privilege technicians can create API ke...

Jan 15, 2025
CVE-2020-36837
9.9

The ThemeGrill Demo Importer WordPress plugin versions 1.3.4 through 1.6.1 contain an authentication bypass vulnerability that allows authenticated at...

Oct 16, 2024
CVE-2024-6303
9.9

This vulnerability in Conduit's Client-Server API allows unauthorized users to manipulate room aliases, including moving the #admins alias to a contro...

Jun 25, 2024
CVE-2023-49742
9.9

This vulnerability in the Support Genix WordPress plugin allows attackers to upload arbitrary files without proper authorization. It affects all WordP...

Apr 18, 2024
CVE-2024-31997
9.9

CVE-2024-31997 is a critical remote code execution vulnerability in XWiki Platform where UI extension parameters are improperly executed as Velocity c...

Apr 10, 2024
CVE-2024-31981
9.9

This vulnerability allows remote code execution in XWiki Platform via PDF export templates. Attackers can execute arbitrary code on affected XWiki ins...

Apr 10, 2024
CVE-2024-31983
9.9

This vulnerability in XWiki Platform allows users with edit rights to modify translations without proper authorization, bypassing script or admin righ...

Apr 10, 2024
CVE-2024-29241
9.9

A missing authorization vulnerability in Synology Surveillance Station's webapi component allows authenticated users to perform unauthorized actions. ...

Mar 28, 2024
CVE-2023-34063
9.9

CVE-2023-34063 is a missing access control vulnerability in VMware Aria Automation that allows authenticated malicious actors to access remote organiz...

Jan 16, 2024
CVE-2021-4368
9.9

The Frontend File Manager WordPress plugin up to version 18.2 has an authenticated settings change vulnerability. Subscriber-level attackers can modif...

Jun 7, 2023
CVE-2023-1782
9.9

This vulnerability allows unauthenticated users to bypass ACL (Access Control List) authorizations in HashiCorp Nomad clusters where mTLS (mutual TLS)...

Apr 5, 2023
CVE-2022-29176
9.9

This vulnerability in RubyGems.org allowed unauthorized users to remove and replace certain gems from the package registry. It affected gems with dash...

May 5, 2022
CVE-2026-3431
9.8

SimStudio versions below 0.5.74 have MongoDB tool endpoints that accept arbitrary connection parameters without authentication or host restrictions. T...

Mar 2, 2026
CVE-2026-2038
9.8

This vulnerability allows remote attackers to bypass authentication on GFI Archiver installations without requiring credentials. The flaw exists in th...

Feb 20, 2026
CVE-2025-70150
9.8

CVE-2025-70150 is a critical missing authentication vulnerability in CodeAstro Membership Management System 1.0 that allows unauthenticated attackers ...

Feb 18, 2026
CVE-2026-1937
9.8

The YayMail WordPress plugin has a privilege escalation vulnerability that allows authenticated attackers with Shop Manager access or higher to modify...

Feb 18, 2026
CVE-2026-1499
9.8

The WP Duplicate plugin for WordPress has a critical vulnerability that allows authenticated attackers with subscriber-level access to upload arbitrar...

Feb 6, 2026
CVE-2026-24371
9.8

This CVE describes a Missing Authorization vulnerability in the BA Book Everything WordPress plugin that allows attackers to bypass access controls. I...

Jan 22, 2026
CVE-2025-69052
9.8

This CVE describes a Missing Authorization vulnerability in the Registration & Login with Mobile Phone Number for WooCommerce WordPress plugin. It all...

Jan 22, 2026
CVE-2025-67913
9.8

This CVE describes a missing authorization vulnerability in the Aruba HiSpeed Cache WordPress plugin that allows attackers to access functionality not...

Jan 8, 2026
CVE-2025-14360
9.8

CVE-2025-14360 is a missing authorization vulnerability in the Kaira Blockons WordPress plugin that allows attackers to access functionality not prope...

Jan 8, 2026
CVE-2025-14358
9.8

This CVE describes a missing authorization vulnerability in the REHub Framework WordPress plugin that allows attackers to access functionality not pro...

Jan 8, 2026
CVE-2025-39477
9.8

This CVE describes a Missing Authorization vulnerability in the InWave Jobs WordPress plugin that allows attackers to bypass access controls. Attacker...

Jan 6, 2026
CVE-2023-54327
9.8

CVE-2023-54327 is an authentication bypass vulnerability in Tinycontrol LAN Controller 1.58a that allows unauthenticated attackers to change administr...

Dec 30, 2025
CVE-2025-68565
9.8

This CVE describes a Missing Authorization vulnerability in the JayBee Twitch Player WordPress plugin (ttv-easy-embed-player) that allows attackers to...

Dec 24, 2025
CVE-2023-53923
9.8

CVE-2023-53923 is a critical privilege escalation vulnerability in UliCMS that allows unauthenticated attackers to create administrative accounts with...

Dec 17, 2025
CVE-2025-12963
9.8

The LazyTasks WordPress plugin has an unauthenticated privilege escalation vulnerability that allows attackers to change any user's email address via ...

Dec 12, 2025
CVE-2023-53740
9.8

CVE-2023-53740 is an authentication bypass vulnerability in Screen SFT DAB 1.9.3 that allows attackers to change the admin password without authentica...

Dec 10, 2025
CVE-2025-13342
9.8

This vulnerability allows unauthenticated attackers to modify critical WordPress configuration options through the Frontend Admin plugin. Attackers ca...

Dec 3, 2025
CVE-2025-66072
9.8

This CVE describes a missing authorization vulnerability in the UsersWP WordPress plugin that allows attackers to bypass access controls. It affects a...

Nov 21, 2025
CVE-2025-12158
9.8

The Simple User Capabilities WordPress plugin has a critical privilege escalation vulnerability that allows unauthenticated attackers to elevate any u...

Nov 4, 2025
CVE-2025-11833
EPSS 30% 9.8

This vulnerability allows unauthenticated attackers to read arbitrary email logs stored by the Post SMTP WordPress plugin, including sensitive emails ...

Nov 1, 2025
CVE-2024-13994
9.8

Nagios XI versions before 2024R1.1.2 have a missing authorization vulnerability when 'Allow Insecure Logins' is enabled. This allows any user to creat...

Oct 30, 2025
CVE-2025-62944
9.8

This CVE describes a Missing Authorization vulnerability in the MSTW CSV EXPORTER WordPress plugin that allows attackers to bypass access controls and...

Oct 27, 2025
CVE-2025-62906
9.8

This CVE describes a Missing Authorization vulnerability in the Referral Link Tracker WordPress plugin that allows attackers to bypass access controls...

Oct 27, 2025
CVE-2025-9054
9.8

This vulnerability allows unauthenticated attackers to modify WordPress site options via the MultiLoca WooCommerce plugin, potentially enabling them t...

Sep 24, 2025
CVE-2025-10690
9.8

This vulnerability allows unauthenticated attackers to upload arbitrary ZIP files containing malicious plugins to WordPress sites using the Goza theme...

Sep 19, 2025
CVE-2024-32832
9.8

This CVE describes a Missing Authorization vulnerability in the WordPress Login with Phone Number plugin that allows attackers to bypass authenticatio...

Aug 31, 2025
CVE-2025-52352
9.8

The Aikaan IoT management platform v3.25.0325-5-g2e9c59796 has a critical authentication bypass vulnerability where the sign-up API endpoint remains a...

Aug 21, 2025
CVE-2025-8898
9.8

This vulnerability allows unauthenticated attackers to change any user's email address in the Taxi Booking Manager for Woocommerce plugin, including a...

Aug 16, 2025

About Missing Authorization (CWE-862)

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

Our database tracks 2,985 CVEs classified as CWE-862, with 211 rated critical and 809 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.2.

External reference: View CWE-862 on MITRE CWE →

Monitor Missing Authorization Vulnerabilities

Get alerted when new Missing Authorization CVEs affect your infrastructure.

Start Monitoring Free