CWE-862: Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Yearly Trend
Top Affected Vendors
All Missing Authorization CVEs (3,069)
The Contact Form 7 AWeber Extension plugin for WordPress has an authorization vulnerability that allows authenticated users with Subscriber-level acce...
Nov 8, 2025The Page & Post Notes WordPress plugin has a missing capability check vulnerability that allows authenticated users with Subscriber-level access or hi...
Nov 7, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to send arbitrary emails from the site with attacker-co...
Nov 5, 2025The KiotViet Sync WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to modify...
Nov 5, 2025This vulnerability allows authenticated WordPress users with Contributor-level access or higher to upload arbitrary files to affected servers due to m...
Nov 5, 2025The Features plugin for WordPress has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to revert ...
Nov 5, 2025The Import Export For WooCommerce WordPress plugin has an authorization bypass vulnerability that allows authenticated users with Subscriber-level acc...
Nov 4, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to create and publish arbitrary posts without proper au...
Nov 4, 2025This CVE describes a missing authorization vulnerability in the WebToffee Smart Coupons for WooCommerce plugin that allows attackers to bypass access ...
Oct 31, 2025This CVE describes a missing authorization vulnerability in the Insert PHP Code Snippet WordPress plugin that allows attackers to exploit incorrectly ...
Oct 31, 2025The Events Calendar WordPress plugin versions up to 6.15.9 have an authorization vulnerability where authenticated users with Subscriber-level permiss...
Oct 31, 2025The FuseWP WordPress plugin has an authorization bypass vulnerability that allows unauthenticated attackers to modify sync rules between WordPress use...
Oct 31, 2025The Jenkins Publish to Bitbucket Plugin before version 0.5 has a missing permission check that allows authenticated attackers with only Overall/Read p...
Oct 29, 2025The Jenkins Themis Plugin 1.4.1 and earlier contains a missing permission check vulnerability that allows authenticated attackers with Overall/Read pe...
Oct 29, 2025This vulnerability in Jenkins Start Windocks Containers Plugin allows attackers with Overall/Read permission to connect to arbitrary URLs, potentially...
Oct 29, 2025The Jenkins Nexus Task Runner Plugin before version 0.9.3 has a missing permission check vulnerability. Attackers with Overall/Read permission can for...
Oct 29, 2025This vulnerability in the Call Now Button WordPress plugin allows authenticated attackers with Subscriber-level access or higher to access and modify ...
Oct 29, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to link the vulnerable plugin to external nowbuttons.co...
Oct 29, 2025This CVE describes a missing authorization vulnerability in the BoldGrid Client Invoicing by Sprout Invoices WordPress plugin. It allows attackers to ...
Oct 29, 2025This CVE describes a missing authorization vulnerability in the Evergreen Content Poster WordPress plugin that allows attackers to exploit incorrectly...
Oct 29, 2025This CVE describes a Missing Authorization vulnerability in the KiotViet Sync WordPress plugin that allows attackers to bypass access controls. It aff...
Oct 27, 2025This CVE describes a missing authorization vulnerability in the WebinarPress WordPress plugin (formerly WPWebinarSystem) that allows attackers to bypa...
Oct 27, 2025This CVE describes a Missing Authorization vulnerability in the Premmerce User Roles WordPress plugin that allows attackers to exploit incorrectly con...
Oct 27, 2025This CVE describes a missing authorization vulnerability in WP-Lister Lite for eBay WordPress plugin that allows attackers to bypass access controls. ...
Oct 27, 2025This CVE describes a missing authorization vulnerability in the Seriously Simple Podcasting WordPress plugin that allows attackers to exploit incorrec...
Oct 27, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to disconnect the site's connection to miniorange servi...
Oct 25, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to modify the NGINX Cache Optimizer plugin's blacklist ...
Oct 24, 2025The Check Plagiarism WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level permissions or higher t...
Oct 24, 2025The Originality.ai AI Checker WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or high...
Oct 24, 2025Jira Align has an authorization vulnerability where low-privilege users can access endpoints they shouldn't, potentially viewing sensitive information...
Oct 22, 2025This CVE describes a Missing Authorization vulnerability in the Rustaurius Front End Users WordPress plugin that allows unauthorized users to access f...
Oct 22, 2025This CVE describes a Missing Authorization vulnerability in the Sovlix MeetingHub WordPress plugin that allows unauthorized users to access functional...
Oct 22, 2025This CVE describes a Missing Authorization vulnerability in the WPXPO WowRevenue WordPress plugin that allows unauthorized users to access functionali...
Oct 22, 2025This CVE describes a Missing Authorization vulnerability in the Repuso Social Proof Testimonials and Reviews WordPress plugin. It allows attackers to ...
Oct 22, 2025This CVE describes a Missing Authorization vulnerability in the One Page Express Companion WordPress plugin. It allows attackers to perform actions wi...
Oct 22, 2025This CVE describes a missing authorization vulnerability in the POSIMYTH UiChemy WordPress plugin. It allows authenticated users to perform actions th...
Oct 22, 2025This vulnerability allows attackers to bypass authorization controls in the Smash Balloon Social Post Feed WordPress plugin, potentially accessing res...
Oct 22, 2025This CVE describes a missing authorization vulnerability in the RealMag777 MDTF WordPress plugin that allows attackers to bypass intended access contr...
Oct 22, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to view other users' wishlist data through the WPC Smar...
Oct 18, 2025This vulnerability allows guest users in Mattermost to discover active public channels and their metadata through an API endpoint, bypassing intended ...
Oct 16, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to modify plugin settings and features without proper a...
Oct 15, 2025The SureForms WordPress plugin has an access control vulnerability in its REST API endpoint that allows authenticated users with contributor-level per...
Oct 14, 2025The Newsup WordPress theme has a vulnerability that allows unauthenticated attackers to install the ansar-import plugin without proper authorization. ...
Oct 11, 2025This vulnerability allows unauthorized access to the /show/integrations endpoint in JhumanJ OpnForm up to version 1.9.3. Attackers can exploit this mi...
Oct 8, 2025This vulnerability allows unauthenticated attackers to submit feedback data to external services via the WDesignKit WordPress plugin. It affects WordP...
Oct 4, 2025This CVE describes a Missing Authorization vulnerability in WP Subscription Forms PRO WordPress plugin that allows unauthorized users to delete arbitr...
Sep 26, 2025This CVE describes a Missing Authorization vulnerability in the Nota Fiscal Eletrônica WooCommerce WordPress plugin that allows attackers to exploit ...
Sep 26, 2025This CVE describes a Missing Authorization vulnerability in the WordPress Subscribe to Download plugin that allows attackers to bypass intended access...
Sep 26, 2025This CVE describes a missing authorization vulnerability in the Netgsm WordPress plugin that allows attackers to bypass access controls. Attackers cou...
Sep 26, 2025This CVE describes a missing authorization vulnerability in the WordPress Delisho plugin that allows attackers to bypass intended access controls. It ...
Sep 26, 2025About Missing Authorization (CWE-862)
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Our database tracks 3,069 CVEs classified as CWE-862, with 230 rated critical and 871 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.3.
External reference: View CWE-862 on MITRE CWE →
Monitor Missing Authorization Vulnerabilities
Get alerted when new Missing Authorization CVEs affect your infrastructure.
Start Monitoring Free