CWE-862: Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Yearly Trend
Top Affected Vendors
All Missing Authorization CVEs (2,990)
The B Blocks WordPress plugin has a critical privilege escalation vulnerability that allows unauthenticated attackers to create new administrator acco...
Aug 12, 2025CVE-2025-46811 is a critical Missing Authorization vulnerability in SUSE Linux Manager that allows any user who can connect to port 443 of SUSE Manage...
Jul 30, 2025The Platform theme for WordPress has an authentication bypass vulnerability that allows unauthenticated attackers to modify WordPress site options. Th...
Jul 25, 2025This vulnerability allows unauthenticated attackers to generate login tokens for arbitrary WordPress users in the WebinarIgnition plugin, leading to a...
Jul 24, 2025This vulnerability in the ONLYOFFICE Docs WordPress plugin allows unauthenticated attackers to escalate privileges by exploiting a missing authorizati...
Jul 24, 2025The bSecure WordPress plugin versions 1.3.7 through 1.7.9 have an authentication bypass vulnerability in their order_info REST endpoint. Unauthenticat...
Jul 22, 2025The PT Project Notebooks WordPress plugin versions 1.0.0 through 1.1.3 contain a privilege escalation vulnerability in the wpnb_pto_new_users_add() fu...
Jun 28, 2025CVE-2025-32281 is a missing authorization vulnerability in the WPKit For Elementor WordPress plugin that allows attackers to update arbitrary WordPres...
Jun 27, 2025Dell PowerScale OneFS versions 9.5.0.0 through 9.10.0.1 have a critical missing authorization vulnerability in NFS export. Unauthenticated remote atta...
Jun 20, 2025This vulnerability allows unauthenticated attackers to install arbitrary WordPress plugins on sites running the vulnerable FunnelKit plugin. Attackers...
Jun 18, 2025This vulnerability allows unauthenticated attackers to create new administrator accounts on WordPress sites using the REST API | Custom API Generator ...
Jun 13, 2025The WP Email Debug plugin for WordPress has a privilege escalation vulnerability that allows unauthenticated attackers to redirect all email traffic t...
Jun 6, 2025The HyperComments WordPress plugin has a critical vulnerability that allows unauthenticated attackers to modify WordPress site options. This can be ex...
Jun 5, 2025A missing authorization vulnerability in Znuny's Generic Interface allows attackers to modify ticket metadata without proper permission checks. This a...
May 12, 2025Digigram's PYKO-OUT audio-over-IP web-server has no default password requirement, allowing unauthenticated attackers to connect and compromise the dev...
May 2, 2025This vulnerability allows any user with access to XWiki pages to switch authentication methods, potentially disrupting authentication systems. It affe...
Apr 30, 2025This vulnerability in Seclore v3.27.5.0 allows attackers to bypass authentication through brute force attacks on the login page. Attackers can gain un...
Apr 18, 2025This vulnerability allows macOS shortcuts to execute with administrative privileges without proper authentication. It affects macOS Ventura, Sequoia, ...
Mar 31, 2025This vulnerability allows malicious applications to delete files they shouldn't have permission to access by exploiting improper symlink handling. It ...
Mar 31, 2025This CVE describes a macOS sandbox bypass vulnerability where malicious applications can access protected user data from system pasteboards. It affect...
Mar 31, 2025This CVE describes a macOS sandbox bypass vulnerability that allows malicious applications to check for the existence of arbitrary file system paths. ...
Mar 31, 2025This vulnerability allows malicious applications to access Safari bookmarks without proper authorization checks. It affects macOS systems running vuln...
Mar 31, 2025This vulnerability allows malicious applications to bypass verification code rate limiting and access saved passwords in macOS. It affects macOS users...
Mar 31, 2025A permissions vulnerability in macOS allows applications to bypass security restrictions and access protected user data. This affects macOS Ventura, S...
Mar 31, 2025This vulnerability allows attackers to bypass authorization checks in Drupal OAuth2 Server through forceful browsing, potentially accessing restricted...
Mar 31, 2025This CVE describes a Missing Authorization vulnerability in Drupal's Authenticator Login module that allows attackers to bypass authentication control...
Mar 31, 2025This vulnerability allows unauthenticated attackers to modify WordPress site options via the Checkout Mestres do WP for WooCommerce plugin. Attackers ...
Mar 29, 2025The Altair WordPress theme has a critical vulnerability that allows unauthenticated attackers to modify WordPress site options without permission. Thi...
Mar 19, 2025This vulnerability allows unauthenticated attackers to change any WordPress user's password, including administrators, in the Golo City Travel Guide t...
Mar 7, 2025The Newscrunch WordPress theme contains a vulnerability that allows authenticated users with Subscriber-level access or higher to upload arbitrary fil...
Mar 4, 2025This CVE describes a missing authorization vulnerability in the WordPress Residential Address Detection plugin that allows attackers to update arbitra...
Mar 3, 2025The Oliver POS WordPress plugin exposes sensitive clientToken data through logging functionality, allowing unauthenticated attackers to extract creden...
Feb 15, 2025The Media Manager for UserPro WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to modify WordPress si...
Jan 30, 2025This CVE describes a Missing Authorization vulnerability in the Agency Toolkit WordPress plugin that allows attackers to escalate privileges. Any Word...
Dec 31, 2024The WooCommerce Point of Sale plugin for WordPress has a privilege escalation vulnerability that allows unauthenticated attackers to change email addr...
Dec 25, 2024This CVE describes a Missing Authorization vulnerability in the Eyewear prescription form WordPress plugin that allows attackers to update arbitrary o...
Dec 13, 2024CVE-2024-45493 allows attackers to bypass local-only authentication restrictions for internal user accounts on MSA FieldServer Gateway devices. Attack...
Dec 10, 2024This CVE describes a missing authorization vulnerability in the Sweet Date WordPress theme that allows privilege escalation. Attackers can exploit thi...
Dec 9, 2024This CVE describes an unauthenticated broken access control vulnerability in the SoftLab Integrate Google Drive WordPress plugin. Attackers can exploi...
Dec 9, 2024The SV100 Companion WordPress plugin has a critical vulnerability that allows unauthenticated attackers to modify WordPress settings, including changi...
Dec 6, 2024This vulnerability allows unauthenticated attackers to bypass authorization in the CleanTalk WordPress plugin and install arbitrary plugins. Attackers...
Nov 26, 2024NVIDIA Base Command Manager's CMDaemon component lacks proper authentication, allowing attackers to execute arbitrary code, escalate privileges, or di...
Nov 23, 2024This CVE describes a missing authorization vulnerability in Medma Technologies Matix Popup Builder WordPress plugin that allows attackers to update ar...
Nov 14, 2024A missing authorization vulnerability (CWE-862) in Schneider Electric products allows unauthorized access when devices are network-enabled. This could...
Nov 13, 2024The Leopard WordPress Offload Media plugin has an authorization bypass vulnerability that allows authenticated users with Subscriber-level access or h...
Nov 9, 2024The Debug Tool plugin for WordPress has a critical vulnerability that allows unauthenticated attackers to create arbitrary files, including PHP files,...
Nov 9, 2024CVE-2024-48073 is a critical privilege escalation vulnerability in sunniwell HT3300 devices where the update program has insecure sudo permissions and...
Nov 8, 2024This vulnerability in the WordPress Signup Page plugin allows attackers to update arbitrary WordPress options without proper authorization, leading to...
Oct 29, 2024This vulnerability in Neye3C v4.5.2.0 firmware update and download processes allows attackers to extract sensitive information by reverse-engineering ...
Oct 24, 2024The SiteGround Optimizer WordPress plugin up to version 5.0.12 contains an authorization bypass vulnerability in its REST API endpoint. This allows un...
Oct 16, 2024About Missing Authorization (CWE-862)
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Our database tracks 2,990 CVEs classified as CWE-862, with 211 rated critical and 814 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.2.
External reference: View CWE-862 on MITRE CWE →
Monitor Missing Authorization Vulnerabilities
Get alerted when new Missing Authorization CVEs affect your infrastructure.
Start Monitoring Free