CWE-862: Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Yearly Trend
Top Affected Vendors
All Missing Authorization CVEs (3,017)
This vulnerability allows attackers to bypass authorization controls in the Redirection for Contact Form 7 WordPress plugin, potentially modifying red...
Dec 13, 2024This CVE describes a missing authorization vulnerability in the Total-Soft Portfolio Gallery WordPress plugin that allows attackers to bypass access c...
Dec 13, 2024This CVE describes a Missing Authorization vulnerability in the Easing Slider WordPress plugin that allows unauthorized users to reset plugin settings...
Dec 13, 2024CVE-2023-32520 is a missing authorization vulnerability in the Webcodin WCP Contact Form WordPress plugin that allows attackers to bypass access contr...
Dec 13, 2024This CVE describes a Missing Authorization vulnerability in the Video Gallery – YouTube Gallery WordPress plugin that allows attackers to bypass acc...
Dec 13, 2024This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to update arbitrary user metadata due to a missing capa...
Dec 12, 2024This CVE describes a Missing Authorization vulnerability in the RegistrationMagic WordPress plugin that allows attackers to bypass access controls. It...
Dec 9, 2024This CVE describes a Missing Authorization vulnerability in the Quick Paypal Payments WordPress plugin that allows attackers to exploit incorrectly co...
Dec 9, 2024This CVE describes a Missing Authorization vulnerability in Shopfiles Ltd's Ebook Store WordPress plugin that allows attackers to bypass access contro...
Dec 9, 2024This vulnerability in WeGIA 3.2.0 allows unauthorized users to change passwords without proper permission checks. It affects all installations of WeGI...
Dec 7, 2024The TI WooCommerce Wishlist plugin for WordPress has an authorization bypass vulnerability that allows unauthenticated attackers to create pages, modi...
Dec 4, 2024This vulnerability allows attackers to bypass access controls in Handcent NextSMS's content provider, potentially exposing sensitive messaging data. I...
Dec 2, 2024This CVE describes a missing authorization vulnerability in the WpTravelly WordPress plugin that allows attackers to access functionality not properly...
Nov 1, 2024This CVE describes a missing authorization vulnerability in the Masteriyo LMS WordPress plugin that allows attackers to access functionality not prope...
Nov 1, 2024The Forminator WordPress plugin has an authorization bypass vulnerability that allows authenticated users with Contributor-level access or higher to c...
Oct 26, 2024This vulnerability in the Minecraft mod 'Command Block IDE' allows any user to modify function files on dedicated servers due to missing authorization...
Oct 21, 2024The Download Monitor WordPress plugin up to version 4.7.51 has an authorization bypass vulnerability in REST-API reporting routes. Unauthenticated att...
Oct 16, 2024This vulnerability in Oracle Service Bus allows unauthenticated attackers with network access via HTTP to access sensitive data. It affects Oracle Fus...
Oct 15, 2024This vulnerability in Oracle WebLogic Server allows unauthenticated attackers with network access via T3 or IIOP protocols to access sensitive data. I...
Oct 15, 2024The D-Link DIR-823G router version 1.0.2B05_20181207 allows unauthorized users to download configuration files containing plaintext passwords. This vu...
Sep 6, 2024This CVE describes a Missing Authorization vulnerability in the WP Swings Wallet System for WooCommerce WordPress plugin. It allows attackers to acces...
Aug 13, 2024This vulnerability allows unauthenticated attackers to access sensitive data and functionality in WooCommerce OpenPos due to missing authorization che...
Aug 13, 2024This CVE-2024-6760 vulnerability allows unprivileged users to trace setuid programs due to a kernel tracing logic bug, enabling them to inspect progra...
Aug 12, 2024This vulnerability in the File Manager Pro – Filester WordPress plugin allows authenticated attackers with administrator-granted permissions to modi...
Aug 3, 2024CVE-2024-6805 is an authorization bypass vulnerability in NI VeriStand Gateway that allows unauthorized actors to access File Transfer resources. This...
Jul 22, 2024CVE-2023-48759 is a missing authorization vulnerability in the JetElements for Elementor WordPress plugin that allows unauthenticated attackers to dow...
Jun 19, 2024This CVE describes a missing authorization vulnerability in the Consensu.IO WordPress plugin that allows unauthorized users to perform actions intende...
Jun 12, 2024This CVE describes a Missing Authorization vulnerability in the Advanced Local Pickup for WooCommerce WordPress plugin. It allows attackers to bypass ...
Jun 9, 2024CVE-2024-32798 is a missing authorization vulnerability in WP Travel Engine WordPress plugin that allows attackers to manipulate booking prices withou...
Jun 9, 2024This CVE describes a Missing Authorization (Broken Access Control) vulnerability in the BizPrint WordPress plugin. It allows unauthorized users to acc...
Jun 9, 2024This CVE describes a Missing Authorization vulnerability in the XStore WordPress theme that allows unauthenticated attackers to perform unauthorized a...
Jun 9, 2024CVE-2024-33543 is a missing authorization vulnerability in the WP Time Slots Booking Form WordPress plugin that allows attackers to bypass access cont...
Jun 9, 2024CVE-2024-31243 is a missing authorization vulnerability in the Bricksforge WordPress plugin that allows unauthenticated attackers to delete arbitrary ...
Jun 9, 2024This CVE describes an incorrect authorization vulnerability in lunary-ai/lunary that allows unauthenticated users to delete any dataset without proper...
Jun 6, 2024This CVE-2024-4520 vulnerability allows any user on the gaizhenbiao/chuanhuchatgpt server to access other users' chat histories without authorization....
Jun 4, 2024This CVE describes a Missing Authorization vulnerability in the Netgsm WordPress plugin that allows unauthorized users to perform privileged actions. ...
Jun 4, 2024This vulnerability in MIT IdentiBot allows unauthorized Discord servers to execute commands that reveal personal information of verified MIT affiliate...
May 27, 2024This vulnerability allows any user, including those without authentication, to delete datasets in lunary-ai/lunary by sending a DELETE request to the ...
May 20, 2024This vulnerability allows unauthenticated attackers to modify all settings of the Fluent Forms WordPress plugin via a REST API endpoint lacking proper...
May 18, 2024This CVE describes a Missing Authorization vulnerability in the Sharkdropship WordPress plugin that allows unauthorized users to delete arbitrary cont...
May 14, 2024This CVE describes a Missing Authorization vulnerability in the Leaky Paywall WordPress plugin that allows unauthenticated users to manipulate subscri...
Apr 29, 2024This CVE describes a Missing Authorization vulnerability in the ProFaceOff SSU WordPress plugin (also known as WP S3 Smart Upload). It allows unauthor...
Apr 29, 2024This CVE describes a Missing Authorization vulnerability in the Simple File List WordPress plugin that allows unauthorized file deletion. Attackers ca...
Apr 17, 2024This CVE describes a Missing Authorization vulnerability in the Sonaar Music MP3 Audio Player WordPress plugin that allows unauthenticated attackers t...
Apr 10, 2024This CVE describes a Missing Authorization vulnerability in the WPExperts Wholesale For WooCommerce WordPress plugin. It allows unauthenticated attack...
Apr 10, 2024This CVE describes a Missing Authorization vulnerability in the WordPress plugin '5 Stars Rating Funnel' by Saleswonder.Biz. It allows unauthenticated...
Apr 10, 2024This vulnerability in the WP Compress – Image Optimizer WordPress plugin allows unauthenticated attackers to reset the CDN region and set malicious ...
Apr 9, 2024This vulnerability in certain Lenovo printers allows unauthenticated attackers to retrieve the administrator password. Affected organizations using vu...
Apr 5, 2024This vulnerability allows unauthenticated attackers to list directories and access sensitive files in Best Student Result Management System v1.0. Anyo...
Mar 21, 2024nGrinder versions before 3.5.9 have an access control vulnerability that allows attackers to create or modify webhook configurations without proper au...
Mar 7, 2024About Missing Authorization (CWE-862)
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Our database tracks 3,017 CVEs classified as CWE-862, with 220 rated critical and 831 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.2.
External reference: View CWE-862 on MITRE CWE →
Monitor Missing Authorization Vulnerabilities
Get alerted when new Missing Authorization CVEs affect your infrastructure.
Start Monitoring Free