CWE-862: Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Yearly Trend
Top Affected Vendors
All Missing Authorization CVEs (2,998)
CVE-2026-0511 is a missing authorization vulnerability in SAP Fiori App Intercompany Balance Reconciliation that allows authenticated users to escalat...
Jan 13, 2026This CVE describes a Missing Authorization vulnerability in the Traveler WordPress theme that allows attackers to bypass access controls. It affects a...
Jan 8, 2026This CVE describes a Missing Authorization vulnerability in the WP Attractive Donations System WordPress plugin that allows attackers to delete arbitr...
Jan 8, 2026This CVE describes a Missing Authorization vulnerability in the WeDesignTech Portfolio WordPress plugin that allows attackers to bypass access control...
Dec 30, 2025This vulnerability allows attackers to bypass authorization controls in the DesignThemes LMS Addon WordPress plugin, potentially accessing restricted ...
Dec 30, 2025This CVE describes a Missing Authorization vulnerability in the WordPress Editorial Calendar plugin that allows attackers to bypass access controls. A...
Dec 24, 2025This CVE describes a missing authorization vulnerability in the totalsoft TS Poll WordPress plugin (poll-wp) that allows attackers to exploit incorrec...
Dec 24, 2025This CVE describes a Missing Authorization vulnerability in the WP Telegram Widget and Join Link WordPress plugin that allows attackers to bypass acce...
Dec 24, 2025This CVE describes a Missing Authorization vulnerability in the Simple File List WordPress plugin that allows attackers to bypass access controls. It ...
Dec 24, 2025This CVE describes a Missing Authorization vulnerability in the Opinion Stage Poll, Survey & Quiz Maker WordPress plugin that allows attackers to bypa...
Dec 24, 2025This vulnerability allows attackers to bypass authorization controls in the FV Simpler SEO WordPress plugin, potentially accessing administrative func...
Dec 24, 2025This CVE describes a missing authorization vulnerability in YITH Slider for page builders WordPress plugin that allows attackers to bypass access cont...
Dec 24, 2025This CVE describes a missing authorization vulnerability in the Watu Quiz WordPress plugin that allows attackers to bypass access controls. Attackers ...
Dec 24, 2025This CVE describes a missing authorization vulnerability in the Addonify Quick View WordPress plugin that allows attackers to bypass access controls. ...
Dec 24, 2025This CVE describes a Missing Authorization vulnerability in the Tablesome WordPress plugin that allows attackers to bypass access controls. It affects...
Dec 24, 2025This CVE describes a Missing Authorization vulnerability in the Spiffy Calendar WordPress plugin that allows attackers to bypass access controls. It a...
Dec 24, 2025The Beaver Builder WordPress plugin has an authorization bypass vulnerability that allows authenticated users with Subscriber-level access or higher t...
Dec 23, 2025The Blaze Demo Importer WordPress plugin allows authenticated attackers with subscriber-level access or higher to reset the database, delete files, an...
Dec 12, 2025This CVE describes a missing authorization vulnerability in the Trinity Audio WordPress plugin that allows attackers to bypass access controls. It aff...
Dec 9, 2025This CVE describes a Missing Authorization vulnerability in VillaTheme's Thank You Page Customizer for WooCommerce plugin. It allows attackers to expl...
Dec 9, 2025Apache OpenOffice Calc has a missing authorization vulnerability that allows attackers to craft documents with external data source links that load wi...
Nov 12, 2025This vulnerability in Nuance PowerScribe allows unauthorized attackers to access sensitive information over the network due to missing authorization c...
Nov 11, 2025The LC Wizard WordPress plugin has a privilege escalation vulnerability that allows unauthenticated attackers to create administrator accounts when PR...
Nov 7, 2025This vulnerability allows attackers to bypass authorization controls in the Advanced Google Maps WordPress plugin, potentially accessing administrativ...
Nov 6, 2025This vulnerability allows attackers to bypass authorization controls in the RealMag777 MDTF WordPress plugin, potentially accessing or modifying restr...
Oct 27, 2025This vulnerability allows attackers to bypass authorization controls in the ilmosys Open Close WooCommerce Store WordPress plugin, enabling unauthoriz...
Oct 27, 2025This CVE describes a missing authorization vulnerability in the Reoon Email Verifier WordPress plugin that allows attackers to bypass access controls....
Oct 27, 2025This CVE describes a Missing Authorization vulnerability in the Conversios.io plugin for WooCommerce that allows attackers to bypass access controls. ...
Oct 27, 2025This vulnerability allows attackers to bypass authorization controls in the SEO Meta Description Updater WordPress plugin, enabling unauthorized acces...
Oct 27, 2025This CVE describes a missing authorization vulnerability in the WordPress Export Categories plugin that allows attackers to access functionality not p...
Oct 27, 2025This CVE describes a Missing Authorization vulnerability in the Smart WeTransfer WordPress plugin that allows attackers to bypass access controls. Att...
Oct 27, 2025This CVE describes a Missing Authorization vulnerability in the ClickSend SMS Contact Form 7 Notifications WordPress plugin that allows attackers to e...
Oct 27, 2025This vulnerability in Oracle Financial Services Analytical Applications Infrastructure allows authenticated attackers with low privileges to remotely ...
Oct 21, 2025A missing authorization vulnerability in Zyxel firewall devices allows semi-authenticated attackers who have completed only the first stage of 2FA to ...
Oct 21, 2025This vulnerability allows attackers to join any Mattermost team without proper authorization by manipulating RelayState parameters. Attackers can bypa...
Oct 16, 2025The Cost Calculator Builder plugin for WordPress has an authorization vulnerability that allows authenticated users with Subscriber-level access or hi...
Oct 4, 2025The Miniorange OTP Verification with Firebase WordPress plugin allows unauthenticated attackers to escalate privileges to Administrator when premium f...
Sep 19, 2025The WP Legal Pages WordPress plugin has a missing capability check that allows authenticated users with Contributor-level access or higher to install ...
Sep 18, 2025This vulnerability in the Malcure Malware Scanner WordPress plugin allows authenticated attackers with Subscriber-level access or higher to delete arb...
Jul 16, 2025CVE-2025-52813 is a missing authorization vulnerability in the pietro MobiLoud WordPress plugin that allows attackers to bypass access controls. This ...
Jul 4, 2025Samsung Galaxy Buds and Galaxy Buds 2 audio devices are vulnerable to unauthorized Bluetooth pairing by default, allowing attackers within Bluetooth r...
May 14, 2025This vulnerability in the Projectopia WordPress plugin allows authenticated attackers with Subscriber-level access or higher to delete arbitrary WordP...
May 1, 2025The Page View Count WordPress plugin versions 2.8.0 to 2.8.4 contain a missing capability check that allows authenticated users with Subscriber-level ...
May 1, 2025The ZoomSounds WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to modify Wo...
Apr 5, 2025The BWL Advanced FAQ Manager WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or highe...
Mar 26, 2025An improper access control vulnerability in danswer-ai/danswer v0.3.94 allows the first user created in the system to view, modify, and delete chats c...
Mar 20, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to modify critical site options via an AJAX endpoint wi...
Mar 14, 2025This vulnerability in the Flex Mag WordPress theme allows authenticated users with Subscriber-level access or higher to delete arbitrary WordPress opt...
Mar 7, 2025This CVE describes a PHP object injection vulnerability in the Affiliate Links WordPress plugin. Unauthenticated attackers can exploit it via file exp...
Feb 18, 2025This vulnerability allows authenticated low-privileged attackers to delete user accounts in Q-Free MaxTime systems via crafted HTTP requests. It affec...
Feb 12, 2025About Missing Authorization (CWE-862)
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Our database tracks 2,998 CVEs classified as CWE-862, with 213 rated critical and 819 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.2.
External reference: View CWE-862 on MITRE CWE →
Monitor Missing Authorization Vulnerabilities
Get alerted when new Missing Authorization CVEs affect your infrastructure.
Start Monitoring Free