CWE-862: Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

3,036
Total CVEs
226
Critical
844
High
6.3
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
437
2025
1,552
2024
754
2023
138
2022
51

Top Affected Vendors

1 Google 118
2 Sap 34
3 Apple 27
4 Jenkins 22
5 Gitlab 16
6 Xwiki 12
7 Themeum 12
8 Wpdeveloper 11
9 Q Free 11
10 Apache 10

All Missing Authorization CVEs (3,036)

CVE-2024-7858
6.3

The Media Library Folders WordPress plugin has missing capability checks on AJAX functions, allowing authenticated users with subscriber-level access ...

Aug 30, 2024
CVE-2024-43045
6.3

This vulnerability in Jenkins allows attackers with Overall/Read permission to access other users' 'My Views' without proper authorization. It affects...

Aug 7, 2024
CVE-2023-48761
6.3

This CVE describes a Missing Authorization vulnerability in the Crocoblock JetElements For Elementor WordPress plugin. It allows attackers to perform ...

Jun 19, 2024
CVE-2024-4450
6.3

The AliExpress Dropshipping with AliNext Lite WordPress plugin has a missing capability check vulnerability that allows authenticated attackers with s...

Jun 19, 2024
CVE-2024-38506
6.3

This vulnerability allows users without proper permissions to enable the auto-attach option for workflows in JetBrains YouTrack. This could lead to un...

Jun 18, 2024
CVE-2023-36694
6.3

This CVE describes a missing authorization vulnerability in the Kingkong Board WordPress plugin that allows unauthorized users to perform actions inte...

Jun 14, 2024
CVE-2024-31307
6.3

This CVE describes a Missing Authorization vulnerability in the Easy Social Share Buttons WordPress plugin. It allows attackers to perform unauthorize...

Jun 9, 2024
CVE-2024-31281
6.3

This CVE describes a Missing Authorization vulnerability in the Church Admin WordPress plugin that allows attackers to exploit incorrectly configured ...

May 17, 2024
CVE-2023-31234
6.3

This CVE describes a Missing Authorization vulnerability in the Tilda Publishing WordPress plugin that allows unauthorized users to perform actions re...

May 7, 2024
CVE-2022-0611
6.3

CVE-2022-0611 is a missing authorization vulnerability in Snipe-IT asset management software that allows authenticated users to access unauthorized fu...

Feb 16, 2022
CVE-2025-43318
6.2

This CVE describes a macOS vulnerability where an app with root privileges could bypass entitlement checks to access private information. It affects m...

Sep 15, 2025
CVE-2024-55996
6.1

This CVE describes a Missing Authorization vulnerability in the Dreamfox Media Payment gateway per Product for WooCommerce plugin. It allows attackers...

Dec 16, 2024
CVE-2024-41918
6.1

The Rakuten Ichiba mobile apps for Android and iOS contain an improper authorization vulnerability in their custom URL scheme handlers. This allows ot...

Aug 29, 2024
CVE-2025-11380
5.9

The Everest Backup WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to retrieve backup file locations...

Oct 11, 2025
CVE-2025-22385
5.9

Optimizely Configured Commerce versions before 5.2.2408 allow mass account creation without email confirmation for new accounts. This affects all B2B ...

Jan 4, 2025
CVE-2026-0829
5.8

The Frontend File Manager WordPress plugin through version 23.5 allows unauthenticated attackers to send emails through the website without authentica...

Feb 17, 2026
CVE-2025-2246
5.8

This vulnerability allows unauthenticated attackers to access sensitive CI/CD variables through GitLab's GraphQL API. It affects all GitLab CE/EE inst...

Aug 27, 2025
CVE-2025-43008
5.8

CVE-2025-43008 is an authorization bypass vulnerability in SAP systems that allows unauthorized users to view files belonging to other companies. This...

May 13, 2025
CVE-2025-24607
5.8

This CVE describes a Missing Authorization vulnerability in the IdeaPush WordPress plugin that allows attackers to exploit incorrectly configured acce...

Feb 14, 2025
CVE-2025-22720
5.8

This CVE describes a missing authorization vulnerability in the MagePeople Team Booking and Rental Manager WordPress plugin that allows attackers to b...

Jan 31, 2025
CVE-2025-13813
5.6

This vulnerability in Mogu Blog v2 allows unauthorized access to the storage management endpoint due to missing authorization controls. Attackers can ...

Dec 1, 2025
CVE-2025-42891
5.5

CVE-2025-42891 is a missing authorization vulnerability in SAP Enterprise Search for ABAP that allows authenticated attackers with high privileges to ...

Dec 9, 2025
CVE-2025-48608
5.5

This vulnerability allows any app on an Android device to read media files from other user profiles without proper permission checks, leading to unaut...

Dec 8, 2025
CVE-2025-48600
5.5

This CVE describes a missing permission check vulnerability in Android's IntentResolver component that allows local information disclosure across user...

Dec 8, 2025
CVE-2025-48604
5.5

This CVE describes a local privilege escalation vulnerability in Android's MMS service that allows unauthorized file access across user boundaries. An...

Dec 8, 2025
CVE-2025-48591
5.5

This CVE-2025-48591 vulnerability allows local attackers to read files from other users on Android devices without requiring any permissions or user i...

Dec 8, 2025
CVE-2025-5317
5.5

This vulnerability allows local users with administrative privileges on macOS systems to bypass Bitdefender's uninstall password protection. Attackers...

Nov 11, 2025
CVE-2025-59567
5.5

A missing authorization vulnerability in the Elliot Sowersby / RelyWP Coupon Affiliates WordPress plugin allows attackers to bypass access controls an...

Sep 22, 2025
CVE-2024-0028
5.5

This vulnerability in Android's Audio Service allows local attackers to obtain MAC addresses of nearby Bluetooth devices without proper permission che...

Sep 5, 2025
CVE-2025-48524
5.5

This vulnerability allows local attackers to bypass permission checks in Android's WiFi system service, potentially causing denial of service without ...

Sep 4, 2025
CVE-2025-26445
5.5

This vulnerability allows local attackers to access sensitive network connectivity data without proper permissions. It affects Android devices running...

Sep 4, 2025
CVE-2025-26437
5.5

This vulnerability in Android's CredentialManagerService allows local attackers to retrieve candidate credentials without proper permission checks. It...

Sep 4, 2025
CVE-2025-43976
5.5

This vulnerability in the TextNow application for Android allows any installed app without permissions to initiate phone calls without user interactio...

Jul 21, 2025
CVE-2025-24108
5.5

This macOS vulnerability allows applications to bypass sandbox restrictions and access protected user data. It affects macOS systems before Sequoia 15...

Jan 27, 2025
CVE-2025-24096
5.5

This CVE describes a macOS vulnerability where a malicious application can bypass file access restrictions and read arbitrary files on the system. It ...

Jan 27, 2025
CVE-2023-21029
5.5

This vulnerability in Android 13 allows local apps to access app usage data without proper permission checks, potentially exposing which apps are bein...

Mar 24, 2023
CVE-2021-0642
5.5

This Android vulnerability allows local apps to retrieve a trackable identifier from the voicemail settings component without proper permissions. It a...

Aug 17, 2021
CVE-2020-0989
5.5

This CVE describes an information disclosure vulnerability in Windows Mobile Device Management (MDM) Diagnostics that allows authenticated attackers t...

Sep 11, 2020
CVE-2025-13734
5.4

This vulnerability in IBM Engineering Requirements Management DOORS Next allows authenticated users to view and edit data beyond their assigned permis...

Mar 3, 2026
CVE-2026-25391
5.4

This CVE describes a missing authorization vulnerability in the WP Wand AI Content Generation WordPress plugin that allows attackers to exploit incorr...

Feb 19, 2026
CVE-2026-25388
5.4

This CVE describes a Missing Authorization vulnerability in the Ads Pro WordPress plugin (ap-plugin-scripteo) that allows attackers to bypass access c...

Feb 19, 2026
CVE-2026-23804
5.4

This CVE describes a Missing Authorization vulnerability in the Better Business Reviews WordPress plugin that allows attackers to exploit incorrectly ...

Feb 19, 2026
CVE-2026-2284
5.4

This vulnerability in the News Element Elementor Blog Magazine WordPress plugin allows authenticated attackers with Subscriber-level access or higher ...

Feb 19, 2026
CVE-2026-25609
5.4

This MongoDB vulnerability allows authenticated users to bypass intended read-only restrictions on the 'filter' parameter in profile commands, potenti...

Feb 10, 2026
CVE-2025-14895
5.4

The PopupKit WordPress plugin has an authorization bypass vulnerability that allows authenticated users with Subscriber-level access or higher to read...

Feb 10, 2026
CVE-2026-1927
5.4

The Greenshift WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to retrieve ...

Feb 5, 2026
CVE-2026-25028
5.4

This CVE describes a missing authorization vulnerability in the ElementInvader Addons for Elementor WordPress plugin that allows attackers to exploit ...

Feb 3, 2026
CVE-2026-25021
5.4

This CVE describes a Missing Authorization vulnerability in the Mizan Demo Importer WordPress plugin that allows attackers to exploit incorrectly conf...

Feb 3, 2026
CVE-2026-24990
5.4

This CVE describes a missing authorization vulnerability in the WP Docs WordPress plugin that allows attackers to bypass access controls. Attackers ca...

Feb 3, 2026
CVE-2026-24581
5.4

This CVE describes a missing authorization vulnerability in the WP Swings Points and Rewards for WooCommerce plugin that allows attackers to exploit i...

Jan 23, 2026

About Missing Authorization (CWE-862)

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

Our database tracks 3,036 CVEs classified as CWE-862, with 226 rated critical and 844 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.3.

External reference: View CWE-862 on MITRE CWE →

Monitor Missing Authorization Vulnerabilities

Get alerted when new Missing Authorization CVEs affect your infrastructure.

Start Monitoring Free