CWE-862: Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Yearly Trend
Top Affected Vendors
All Missing Authorization CVEs (2,998)
A missing authorization vulnerability in Q-Free MaxTime allows authenticated low-privileged users to delete user groups via crafted HTTP requests. Thi...
Feb 12, 2025This vulnerability in the Click Mag WordPress theme allows authenticated attackers with subscriber-level access or higher to delete arbitrary WordPres...
Feb 12, 2025The ConvertPlus WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to modify c...
Feb 12, 2025This vulnerability in the ZoxPress WordPress theme allows authenticated users with Subscriber-level access or higher to delete arbitrary WordPress opt...
Feb 12, 2025The Live2DWebCanvas WordPress plugin has an arbitrary file deletion vulnerability that allows authenticated attackers with Subscriber-level access or ...
Jan 31, 2025This vulnerability allows attackers to bypass authentication on Tenda AC1200 routers by sending specially crafted web requests. Attackers could gain u...
Jan 16, 2025The NitroPack WordPress plugin has an authorization bypass vulnerability that allows authenticated users with subscriber-level access or higher to mod...
Jan 15, 2025This CVE describes a missing authorization vulnerability in the Premmerce User Roles WordPress plugin that allows attackers to exploit incorrectly con...
Dec 13, 2024This vulnerability allows unauthenticated attackers to gain administrator access on WordPress sites running MainWP Child plugin versions up to 5.2 whe...
Dec 13, 2024CVE-2023-49856 is a missing authorization vulnerability in RedNao Smart Forms WordPress plugin that allows authenticated users to change arbitrary opt...
Dec 9, 2024CVE-2024-42453 is a privilege escalation vulnerability in Veeam Backup & Replication that allows low-privileged users to perform unauthorized actions ...
Dec 4, 2024This vulnerability in Sky Addons for Elementor WordPress plugin allows authenticated attackers with subscriber-level access or higher to modify arbitr...
Nov 22, 2024This CSRF vulnerability in Sky Addons for Elementor allows unauthenticated attackers to modify WordPress site options via forged requests that trick a...
Nov 22, 2024This vulnerability in Oracle Process Manufacturing Product Development allows authenticated attackers with low privileges to perform unauthorized data...
Oct 15, 2024This vulnerability in Oracle Product Hub allows authenticated attackers with low privileges to manipulate critical data or access sensitive informatio...
Oct 15, 2024This vulnerability in the KB Support WordPress plugin allows authenticated attackers with Subscriber-level access or higher to perform unauthorized ad...
Oct 1, 2024This CVE describes a missing authorization vulnerability in the WooCommerce Warranty Requests WordPress plugin. It allows attackers to bypass access c...
Jun 19, 2024This CVE describes a Missing Authorization vulnerability in the WordPress plugin 'New Order Notification for Woocommerce' by Mr.Ebabi. It allows unaut...
Jun 9, 2024The Moneytizer WordPress plugin has a missing capability check vulnerability that allows authenticated users with subscriber-level access or higher to...
Jun 6, 2024This vulnerability in the WooCommerce Add to Cart Custom Redirect plugin allows authenticated attackers with contributor-level access or higher to mod...
Mar 13, 2024This vulnerability allows authenticated users in Rundeck to bypass authorization checks and access two specific URLs, enabling them to view or delete ...
Nov 16, 2023This vulnerability allows authenticated users with read-only permissions on Lenovo ThinkSystem servers to change other users' passwords through a craf...
Oct 25, 2023This vulnerability in XWiki Platform allows attackers with edit access to any document (including default-editable user profiles) to move any attachme...
Oct 25, 2023CVE-2023-39438 is an authorization bypass vulnerability in CLA-assistant that allows any authenticated user to read, update, or delete CLA (Contributo...
Aug 15, 2023The WP Quick FrontEnd Editor plugin for WordPress has a missing capability check vulnerability that allows low-privileged authenticated users (like su...
Jun 7, 2023This vulnerability in StruxureWare Data Center Expert allows attackers to bypass authorization controls and perform unauthorized actions like viewing,...
Apr 18, 2023This vulnerability allows attackers to unlock MEGAFEIS and BOFEI DBD+ smart locks without authorization by sending arbitrary API requests to the mobil...
Mar 21, 2023The ARMember WordPress plugin before version 3.4.8 contains an authentication bypass vulnerability that allows unauthenticated attackers to reset pass...
Jun 27, 2022This vulnerability allows attackers to delete arbitrary files on XOS-Shop systems by manipulating the current_manufacturer_image parameter in the manu...
Jun 16, 2022This CVE describes a broken access control vulnerability in Olivetti d-COLOR MF3555 multifunction printers. Attackers can bypass authentication and ac...
Apr 20, 2022This vulnerability allows authenticated Rundeck users to modify or delete system or project calendars without proper authorization. This could cause s...
Feb 28, 2022CVE-2022-21660 is an authentication bypass vulnerability in gin-vue-admin where low-privilege users can modify higher-privilege user accounts due to m...
Feb 9, 2022CVE-2021-40501 is an authorization bypass vulnerability in SAP ABAP Platform Kernel that allows authenticated business users to escalate privileges an...
Nov 10, 2021Projectsend r1295 has an authorization bypass vulnerability that allows users with uploader role to download and edit all files in the application. Th...
Oct 11, 2021This vulnerability allows unauthenticated attackers to delete all data from affected Compro IP camera devices by accessing a specific CGI script. It a...
Sep 1, 2021This vulnerability in the LearnPress WordPress plugin allows remote attackers to escalate any user's privileges to 'LP Instructor' role via the 'accep...
Jul 30, 2021This vulnerability allows view-only users in Proofpoint Insider Threat Management Server to bypass authorization checks and perform administrative act...
Apr 6, 2021OpenIAM versions before 4.2.0.3 have an authorization bypass vulnerability in the administrative REST API endpoints. Attackers can perform administrat...
Apr 6, 2021This CVE describes a sandbox escape vulnerability in Cursor code editor versions prior to 2.5. A malicious AI agent could write to improperly protecte...
Feb 13, 2026This vulnerability allows low-privileged applications to modify critical system properties to enable ADB over network, potentially granting attackers ...
Oct 25, 2023This vulnerability allows a malicious application to gain root privileges on affected Apple devices. It affects macOS, iOS, iPadOS, and visionOS syste...
Feb 11, 2026This vulnerability allows local attackers to bypass device configuration restrictions in Android's WiFi settings due to missing permission checks. It ...
Dec 8, 2025This vulnerability allows local attackers to install arbitrary certificates on Android devices without proper permissions, enabling local privilege es...
Dec 8, 2025A permissions vulnerability in visionOS allows malicious applications to escalate privileges and gain root access. This affects visionOS devices runni...
Sep 15, 2025A sandbox escape vulnerability in macOS allows malicious applications to bypass security restrictions and access system resources or other application...
Sep 15, 2025This vulnerability allows authenticated users on Windows ARM systems to escalate privileges through Zoom Workplace's installer due to missing authoriz...
Sep 9, 2025This vulnerability allows attackers to bypass Factory Reset Protection (FRP) on Android Wear devices without requiring user interaction or additional ...
Sep 4, 2025This vulnerability allows untrusted Android apps to inject keyboard and touch events into the default Input Method Editor (IME) without proper permiss...
Sep 4, 2025A local privilege escalation vulnerability allows low-privileged users to interact with a service that should be restricted. This affects systems runn...
Aug 5, 2025A Missing Authorization vulnerability in Juniper Networks Junos OS Evolved allows local low-privileged users to gain root privileges by sending packet...
Jul 11, 2025About Missing Authorization (CWE-862)
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Our database tracks 2,998 CVEs classified as CWE-862, with 213 rated critical and 819 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.2.
External reference: View CWE-862 on MITRE CWE →
Monitor Missing Authorization Vulnerabilities
Get alerted when new Missing Authorization CVEs affect your infrastructure.
Start Monitoring Free