CWE-862: Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

3,036
Total CVEs
226
Critical
844
High
6.3
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
437
2025
1,552
2024
754
2023
138
2022
51

Top Affected Vendors

1 Google 118
2 Sap 34
3 Apple 27
4 Jenkins 22
5 Gitlab 16
6 Xwiki 12
7 Themeum 12
8 Wpdeveloper 11
9 Q Free 11
10 Apache 10

All Missing Authorization CVEs (3,036)

CVE-2023-52232
6.5

This CVE describes a Missing Authorization vulnerability in the Booster Plus for WooCommerce WordPress plugin. Authenticated users can delete arbitrar...

Jun 9, 2024
CVE-2024-2035
6.5

This CVE-2024-2035 vulnerability allows any authenticated user in the ZenML platform to modify other users' information, including deactivating their ...

Jun 6, 2024
CVE-2024-33938
6.5

CVE-2024-33938 is a missing authorization vulnerability in the WordPress Sliding Widgets plugin that allows attackers to perform cross-site scripting ...

May 14, 2024
CVE-2024-32717
6.5

This CVE describes a missing authorization vulnerability in the WordPress SchedulePress plugin that allows unauthorized users to perform actions they ...

May 14, 2024
CVE-2021-35001
6.5

This vulnerability in BMC Track-It! allows authenticated attackers to access sensitive information through the GetData endpoint due to missing authori...

May 7, 2024
CVE-2024-33931
6.5

This CVE describes a Missing Authorization vulnerability in the ilGhera JW Player for WordPress plugin. It allows attackers to perform actions without...

May 3, 2024
CVE-2024-33919
6.5

This CVE describes a Missing Authorization vulnerability in the RomethemeKit For Elementor WordPress plugin. It allows attackers to bypass access cont...

May 3, 2024
CVE-2024-3553
6.5

This vulnerability in Tutor LMS WordPress plugin allows unauthenticated attackers to enable user registration on WordPress sites where it was previous...

May 2, 2024
CVE-2024-33944
6.5

This CVE describes a Missing Authorization vulnerability in the Kestrel WooCommerce AWeber Newsletter Subscription WordPress plugin. It allows unauthe...

May 2, 2024
CVE-2022-0579
6.5

CVE-2022-0579 is a missing authorization vulnerability in Snipe-IT asset management software that allows authenticated users to access unauthorized fu...

Feb 14, 2022
CVE-2025-13859
6.4

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to inject malicious JavaScript into AffiliateX plugin s...

Jan 15, 2026
CVE-2025-59021
6.4

This CVE describes an authorization bypass vulnerability in TYPO3 CMS where backend users with redirect module access and write permissions could mani...

Jan 13, 2026
CVE-2025-13866
6.4

This vulnerability in the Flow-Flow Social Feed Stream WordPress plugin allows authenticated attackers with Subscriber-level access or higher to modif...

Dec 12, 2025
CVE-2025-11003
6.4

The UiPress Lite WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to save te...

Nov 21, 2025
CVE-2025-12583
6.4

The Simple Downloads List WordPress plugin has an authorization bypass vulnerability that allows authenticated users with Subscriber-level access or h...

Nov 8, 2025
CVE-2025-28103
6.4

This vulnerability in flaskBlog v2.6.1 allows attackers to delete arbitrary user accounts without proper authorization. Attackers can exploit incorrec...

Apr 21, 2025
CVE-2025-32216
6.4

A missing authorization vulnerability in Spider Elements – Addons for Elementor WordPress plugin allows attackers to bypass intended access controls...

Apr 10, 2025
CVE-2025-31746
6.4

This CVE describes a missing authorization vulnerability in the Think201 Clients WordPress plugin that allows attackers to bypass access controls. It ...

Apr 3, 2025
CVE-2024-13769
6.4

This vulnerability allows authenticated attackers with Subscriber-level access or higher to inject malicious scripts into WordPress sites using the Pu...

Feb 12, 2025
CVE-2025-24606
6.4

This CVE describes a missing authorization vulnerability in the Sprout Invoices WordPress plugin that allows attackers to bypass access controls. It a...

Jan 27, 2025
CVE-2024-6155
6.4

This vulnerability in the Greenshift WordPress plugin allows authenticated users with Subscriber-level access or higher to perform Server-Side Request...

Jan 9, 2025
CVE-2024-56294
6.4

A missing authorization vulnerability in POSIMYTH Nexter Blocks WordPress plugin allows attackers to exploit incorrectly configured access control sec...

Jan 7, 2025
CVE-2024-56002
6.4

This CVE describes a Missing Authorization vulnerability in the MightyForms WordPress plugin that allows attackers to bypass access controls and perfo...

Dec 31, 2024
CVE-2024-43937
6.4

This CVE describes a Missing Authorization vulnerability in the Themeum WP Crowdfunding WordPress plugin that allows attackers to change plugin settin...

Nov 1, 2024
CVE-2024-43143
6.4

This CVE describes a Missing Authorization vulnerability in the WordPress plugin 'Registrations for the Events Calendar' that allows attackers to bypa...

Nov 1, 2024
CVE-2024-45393
6.4

This vulnerability in CVAT allows authenticated attackers to view webhook delivery information for any webhook on the instance, including those belong...

Sep 10, 2024
CVE-2024-6458
6.4

This vulnerability in WooCommerce Product Table Lite plugin allows authenticated users with subscriber-level access or higher to modify arbitrary post...

Jul 27, 2024
CVE-2026-2819
6.3

This vulnerability allows remote attackers to delete workflow instances without proper authorization in Dromara RuoYi-Vue-Plus. It affects systems run...

Feb 20, 2026
CVE-2025-15390
6.3

This vulnerability in PHPGurukul Small CRM 4.0 allows unauthorized access to the edit-user.php admin function, enabling attackers to modify user accou...

Dec 31, 2025
CVE-2025-64192
6.3

This CVE describes a Missing Authorization vulnerability in the XStore WordPress theme that allows attackers to bypass access controls. It affects all...

Dec 18, 2025
CVE-2025-0836
6.3

This CVE describes a broken access control vulnerability in Milestone Systems XProtect VMS where users with read-only access to the Management Server ...

Dec 16, 2025
CVE-2025-2848
6.3

This vulnerability in Synology Mail Server allows authenticated remote attackers to modify non-sensitive settings and disable certain non-critical fun...

Dec 4, 2025
CVE-2025-64384
6.3

This CVE describes a missing authorization vulnerability in the JetFormBuilder WordPress plugin that allows attackers to bypass access controls. Attac...

Nov 13, 2025
CVE-2025-36361
6.3

This vulnerability in IBM App Connect Enterprise allows authenticated users to perform unauthorized actions on customer-defined resources due to missi...

Oct 24, 2025
CVE-2025-49961
6.3

This CVE describes a Missing Authorization vulnerability in the Breeze Checkout WordPress plugin that allows attackers to bypass access controls. It a...

Oct 22, 2025
CVE-2025-11438
6.3

This CVE describes a missing authorization vulnerability in JhumanJ OpnForm's API endpoint at /custom-domains. Attackers can exploit this to perform u...

Oct 8, 2025
CVE-2025-8807
6.3

This critical vulnerability in xujeff tianti (夊梯) up to version 2.3 allows remote attackers to bypass authorization controls on the /tianti-module...

Aug 10, 2025
CVE-2025-5692
6.3

The Lead Form Data Collection to CRM WordPress plugin has a missing capability check vulnerability that allows authenticated attackers with Subscriber...

Jul 2, 2025
CVE-2025-23440
6.3

CVE-2025-23440 is a missing authorization vulnerability in the radSLIDE WordPress plugin that allows attackers to bypass access controls and potential...

Mar 3, 2025
CVE-2025-22702
6.3

This CVE describes a missing authorization vulnerability in the EPC Photography WordPress theme that allows unauthorized users to access restricted fu...

Feb 14, 2025
CVE-2025-1214
6.3

CVE-2025-1214 is a critical missing authorization vulnerability in PiHome 2.0's role-based access control system that allows remote attackers to bypas...

Feb 12, 2025
CVE-2025-0939
6.3

The MagicForm WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level permissions or higher to perfo...

Feb 1, 2025
CVE-2024-13361
6.3

The AI Power WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to upload imag...

Jan 22, 2025
CVE-2024-56266
6.3

This CVE describes a Missing Authorization vulnerability in the Sonaar Music MP3 Audio Player WordPress plugin that allows attackers to access functio...

Jan 2, 2025
CVE-2024-54252
6.3

This CVE describes a missing authorization vulnerability in Pinpoint Booking System WordPress plugin that allows attackers to bypass access controls. ...

Dec 13, 2024
CVE-2023-27449
6.3

CVE-2023-27449 is a missing authorization vulnerability in TotalSuite Total Poll Lite WordPress plugin that allows attackers to exploit incorrectly co...

Dec 9, 2024
CVE-2022-4974
6.3

This vulnerability in the Freemius SDK allows attackers to perform Cross-Site Request Forgery attacks and access sensitive information due to missing ...

Oct 16, 2024
CVE-2020-36834
6.3

The Discount Rules for WooCommerce WordPress plugin has missing authorization checks on AJAX endpoints, allowing authenticated users with subscriber-l...

Oct 16, 2024
CVE-2024-6590
6.3

This vulnerability in the WordPress Spreadsheet Integration plugin allows authenticated attackers with Subscriber-level access or higher to modify dat...

Sep 25, 2024
CVE-2024-7888
6.3

This vulnerability allows authenticated WordPress users with subscriber-level access or higher to modify forms and settings in the Classified Listing ...

Sep 13, 2024

About Missing Authorization (CWE-862)

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

Our database tracks 3,036 CVEs classified as CWE-862, with 226 rated critical and 844 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.3.

External reference: View CWE-862 on MITRE CWE →

Monitor Missing Authorization Vulnerabilities

Get alerted when new Missing Authorization CVEs affect your infrastructure.

Start Monitoring Free