CWE-862: Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

3,042
Total CVEs
226
Critical
850
High
6.3
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
437
2025
1,552
2024
754
2023
138
2022
51

Top Affected Vendors

1 Google 118
2 Sap 35
3 Apple 27
4 Jenkins 22
5 Gitlab 18
6 Xwiki 12
7 Themeum 12
8 Wpdeveloper 11
9 Q Free 11
10 Apache 10

All Missing Authorization CVEs (3,042)

CVE-2024-30466
5.4

This CVE describes a Missing Authorization vulnerability in OnTheGoSystems' WooCommerce Multilingual & Multicurrency WordPress plugin. It allows unaut...

Jun 9, 2024
CVE-2024-24716
5.4

This CVE describes a Missing Authorization vulnerability in the Awesome Support WordPress plugin that allows unauthorized users to access restricted f...

Jun 9, 2024
CVE-2023-23640
5.4

This CVE describes a Missing Authorization vulnerability in the MainWP UpdraftPlus Extension for WordPress. It allows users with Subscriber-level perm...

Jun 9, 2024
CVE-2023-6876
5.4

This vulnerability in the Clever Fox WordPress plugin allows authenticated users with subscriber-level access or higher to change the active theme wit...

Jun 7, 2024
CVE-2024-2017
5.4

This vulnerability in the WordPress Countdown & Clock plugin allows authenticated attackers with subscriber-level access or higher to inject PHP objec...

Jun 6, 2024
CVE-2024-30528
5.4

This CVE describes a Missing Authorization vulnerability in the Spiffy Calendar WordPress plugin, allowing unauthorized users to perform actions inten...

Jun 4, 2024
CVE-2024-1809
5.4

The Analytify WordPress plugin has a vulnerability that allows authenticated attackers with subscriber-level access or higher to access sensitive plug...

May 2, 2024
CVE-2026-2371
5.3

This vulnerability allows unauthenticated attackers to retrieve the HTML content of private, draft, or password-protected reusable blocks in WordPress...

Mar 7, 2026
CVE-2026-1336
5.3

This vulnerability allows unauthenticated attackers to view, modify, or delete the ChatGPT API key stored by the WordPress plugin. It affects all Word...

Mar 3, 2026
CVE-2026-24004
5.3

This vulnerability in Fleet's Android MDM Pub/Sub handling allows unauthenticated attackers to trigger device unenrollment events, causing targeted An...

Feb 26, 2026
CVE-2024-34438
5.3

This CVE describes a Missing Authorization vulnerability in the WordPress Shared Files plugin that allows unauthorized users to access files they shou...

Feb 20, 2026
CVE-2026-27368
5.3

This CVE describes a Missing Authorization vulnerability in SeedProd's WordPress plugin that allows attackers to bypass access controls. It affects al...

Feb 19, 2026
CVE-2025-15563
5.3

This vulnerability allows any unauthenticated user to reset the WorkTime on-prem database configuration by sending a specific HTTP request to the Work...

Feb 19, 2026
CVE-2026-25415
5.3

This CVE describes a Missing Authorization vulnerability in the WPBookit Pro WordPress plugin that allows attackers to bypass intended access controls...

Feb 19, 2026
CVE-2026-25384
5.3

This CVE describes a Missing Authorization vulnerability in WP-Lister Lite for eBay WordPress plugin that allows attackers to bypass access controls. ...

Feb 19, 2026
CVE-2026-25386
5.3

This CVE describes a Missing Authorization vulnerability in the Elementor Ally pojo-accessibility WordPress plugin that allows attackers to exploit in...

Feb 19, 2026
CVE-2026-25364
5.3

This CVE describes a Missing Authorization vulnerability in the BoldGrid Client Invoicing by Sprout Invoices WordPress plugin. It allows attackers to ...

Feb 19, 2026
CVE-2026-25332
5.3

This CVE describes a Missing Authorization vulnerability in the Endless Posts Navigation WordPress plugin that allows attackers to exploit incorrectly...

Feb 19, 2026
CVE-2026-25320
5.3

This vulnerability allows unauthorized users to access contact form submission data stored by the Elementor Contact Form DB WordPress plugin due to mi...

Feb 19, 2026
CVE-2026-25315
5.3

This CVE describes a Missing Authorization vulnerability in the hCaptcha for WP WordPress plugin that allows attackers to bypass access controls. It a...

Feb 19, 2026
CVE-2026-24375
5.3

This CVE describes a missing authorization vulnerability in the Ultimate Gift Cards for WooCommerce plugin that allows attackers to bypass access cont...

Feb 19, 2026
CVE-2026-24999
5.3

This CVE describes a missing authorization vulnerability in the Alma Gateway for WooCommerce WordPress plugin that allows attackers to bypass access c...

Feb 19, 2026
CVE-2025-14357
5.3

The Mega Store Woocommerce WordPress theme has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher t...

Feb 19, 2026
CVE-2025-13930
5.3

This vulnerability allows unauthenticated attackers to delete attachments associated with guest orders in WooCommerce Checkout Field Manager plugin. A...

Feb 19, 2026
CVE-2026-1657
5.3

The EventPrime WordPress plugin allows unauthenticated attackers to upload image files to the WordPress uploads directory and create Media Library att...

Feb 17, 2026
CVE-2026-1932
5.3

The Bookr WordPress plugin has an authentication bypass vulnerability in its REST API endpoint that allows unauthenticated attackers to modify appoint...

Feb 14, 2026
CVE-2025-14067
5.3

The Easy Form Builder WordPress plugin has an authorization bypass vulnerability that allows authenticated users with Subscriber-level access or highe...

Feb 14, 2026
CVE-2026-1537
5.3

This vulnerability in the LatePoint WordPress plugin allows unauthenticated attackers to access sensitive booking data without proper authorization. I...

Feb 12, 2026
CVE-2026-1722
5.3

This vulnerability allows unauthenticated attackers to create arbitrary refund requests for any order in WCFM Marketplace plugin for WordPress. Attack...

Feb 10, 2026
CVE-2025-10753
5.3

The OAuth Single Sign On plugin for WordPress has an authentication bypass vulnerability that allows unauthenticated attackers to modify the global OA...

Feb 6, 2026
CVE-2025-14079
5.3

This vulnerability allows authenticated WordPress users with Subscriber-level permissions or higher to modify global WSDesk settings without proper au...

Feb 5, 2026
CVE-2026-0679
5.3

The Fortis for WooCommerce WordPress plugin has an authorization bypass vulnerability that allows unauthenticated attackers to change WooCommerce orde...

Feb 4, 2026
CVE-2025-15507
5.3

The Magic Import Document Extractor WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to modify the pl...

Feb 4, 2026
CVE-2025-14461
5.3

The Xendit Payment plugin for WordPress has an authentication bypass vulnerability that allows unauthenticated attackers to mark WooCommerce orders as...

Feb 4, 2026
CVE-2026-25019
5.3

This CVE describes a Missing Authorization vulnerability in the Atarim Visual Collaboration WordPress plugin that allows attackers to bypass access co...

Feb 3, 2026
CVE-2026-25010
5.3

This CVE describes a Missing Authorization vulnerability in the WordPress Share This Image plugin that allows attackers to bypass access controls. It ...

Feb 3, 2026
CVE-2026-25012
5.3

This CVE describes a Missing Authorization vulnerability in the WP Bannerize Pro WordPress plugin that allows attackers to exploit incorrectly configu...

Feb 3, 2026
CVE-2026-24994
5.3

This CVE describes a Missing Authorization vulnerability in the Sunshine Photo Cart WordPress plugin that allows attackers to exploit incorrectly conf...

Feb 3, 2026
CVE-2026-24997
5.3

This CVE describes a Missing Authorization vulnerability in the Wired Impact Volunteer Management WordPress plugin that allows attackers to exploit in...

Feb 3, 2026
CVE-2026-24967
5.3

This CVE describes a Missing Authorization vulnerability in the Amelia WordPress booking plugin that allows attackers to bypass access controls. It af...

Feb 3, 2026
CVE-2026-24982
5.3

This CVE describes a missing authorization vulnerability in the Spectra plugin for WordPress, allowing attackers to exploit incorrectly configured acc...

Feb 3, 2026
CVE-2026-24945
5.3

This CVE describes a Missing Authorization vulnerability in the Ultimate Addons for Contact Form 7 WordPress plugin that allows attackers to exploit i...

Feb 3, 2026
CVE-2026-1734
5.3

This vulnerability allows unauthorized remote access to the crontab endpoint in Zhong Bang CRMEB versions up to 5.6.3. Attackers can exploit this miss...

Feb 2, 2026
CVE-2026-1431
5.3

The Booking Calendar plugin for WordPress has an authorization vulnerability that allows unauthenticated attackers to access booking data. This affect...

Jan 31, 2026
CVE-2025-15510
5.3

The NEX-Forms WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to export form configurations containi...

Jan 31, 2026
CVE-2025-15511
5.3

The Rupantorpay WordPress plugin has an authentication bypass vulnerability that allows unauthenticated attackers to modify WooCommerce order statuses...

Jan 28, 2026
CVE-2026-1054
5.3

The RegistrationMagic WordPress plugin up to version 6.0.7.4 has a missing authorization vulnerability that allows unauthenticated attackers to modify...

Jan 28, 2026
CVE-2026-0825
5.3

This vulnerability allows unauthenticated attackers to download all form submission data containing personally identifiable information (PII) from Wor...

Jan 28, 2026
CVE-2026-1310
5.3

The Simple calendar for Elementor WordPress plugin has a missing authorization vulnerability that allows unauthenticated attackers to delete arbitrary...

Jan 28, 2026
CVE-2026-1298
5.3

The Easy Replace Image WordPress plugin has a missing authorization vulnerability that allows authenticated users with Contributor-level access or hig...

Jan 28, 2026

About Missing Authorization (CWE-862)

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

Our database tracks 3,042 CVEs classified as CWE-862, with 226 rated critical and 850 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.3.

External reference: View CWE-862 on MITRE CWE →

Monitor Missing Authorization Vulnerabilities

Get alerted when new Missing Authorization CVEs affect your infrastructure.

Start Monitoring Free