CWE-862: Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

3,077
Total CVEs
231
Critical
877
High
6.3
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
441
2025
1,552
2024
754
2023
138
2022
51

Top Affected Vendors

1 Google 127
2 Sap 37
3 Apple 27
4 Jenkins 23
5 Gitlab 19
6 Xwiki 12
7 Themeum 12
8 Metagauss 11
9 Wpdeveloper 11
10 Q Free 11

All Missing Authorization CVEs (3,077)

CVE-2024-9364
4.3

The SendGrid for WordPress plugin has a missing capability check that allows authenticated users with Subscriber-level access or higher to delete the ...

Oct 18, 2024
CVE-2023-7293
4.3

This vulnerability in the Paytium WordPress plugin allows authenticated attackers with subscriber-level access to verify the existence of a Mollie pay...

Oct 16, 2024
CVE-2024-9891
4.3

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to deactivate the Multiline files upload for contact fo...

Oct 16, 2024
CVE-2024-9756
4.3

The Order Attachments for WooCommerce WordPress plugin versions 2.0 to 2.4.1 has a missing capability check on the wcoa_add_attachment AJAX action, al...

Oct 12, 2024
CVE-2024-9824
4.3

The ImagePress – Image Gallery WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or h...

Oct 12, 2024
CVE-2024-9685
4.3

The Notification for Telegram WordPress plugin versions up to 3.3.1 contain an authorization bypass vulnerability that allows authenticated users with...

Oct 10, 2024
CVE-2024-8675
4.3

The Soumettre.fr WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level permissions or higher to di...

Oct 1, 2024
CVE-2024-8552
4.3

The Download Monitor WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to ena...

Sep 26, 2024
CVE-2024-8434
4.3

The Easy Mega Menu Plugin for WordPress has a missing capability check on AJAX functions, allowing authenticated users with subscriber-level access or...

Sep 25, 2024
CVE-2024-7721
4.3

This vulnerability in the HTML5 Video Player WordPress plugin allows authenticated attackers with Subscriber-level access or higher to modify plugin s...

Sep 11, 2024
CVE-2024-44112
4.3

This vulnerability in SAP for Oil & Gas (Transportation and Distribution) allows authenticated non-administrative users to delete non-sensitive entrie...

Sep 10, 2024
CVE-2024-44115
4.3

This vulnerability in SAP's RFC-enabled function module allows low-privileged users to add URLs to any user's workplace favorites. This enables attack...

Sep 10, 2024
CVE-2024-42380
4.3

This vulnerability in SAP's RFC-enabled function module allows low-privileged users to read any user's workplace favorites and user menu data, includi...

Sep 10, 2024
CVE-2024-8427
4.3

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to modify plugin settings and forms without proper auth...

Sep 6, 2024
CVE-2024-44082
4.3

This vulnerability in OpenStack Ironic and ironic-python-agent allows authenticated users to craft malicious images that could trigger unexpected beha...

Sep 6, 2024
CVE-2024-7605
4.3

The HelloAsso WordPress plugin has an authorization vulnerability where authenticated users with Contributor-level access or higher can modify plugin ...

Sep 5, 2024
CVE-2024-7380
4.3

The Geo Controller WordPress plugin has insufficient access controls that allow authenticated users with Subscriber-level permissions or higher to cre...

Sep 5, 2024
CVE-2024-39591
4.3

CVE-2024-39591 is an authorization bypass vulnerability in SAP Document Builder where a specific function module lacks proper authorization checks. Th...

Aug 13, 2024
CVE-2024-42373
4.3

This vulnerability in SAP Student Life Cycle Management (SLcM) allows authenticated users to bypass authorization checks and delete non-sensitive repo...

Aug 13, 2024
CVE-2024-6987
4.3

The Orchid Store WordPress theme has a missing capability check that allows authenticated users with Subscriber-level access or higher to activate the...

Aug 8, 2024
CVE-2024-6709
4.3

This vulnerability in the WordPress Sync Post With Other Site plugin allows authenticated attackers with Subscriber-level access or higher to create d...

Aug 3, 2024
CVE-2024-37898
4.3

This vulnerability in XWiki Platform allows users with view-only permissions on a page to delete and replace it with new content, bypassing edit and d...

Jul 31, 2024
CVE-2024-1804
4.3

The Tutor LMS Migration Tool WordPress plugin has an authorization bypass vulnerability that allows authenticated users with subscriber-level access o...

Jul 27, 2024
CVE-2024-6836
4.3

This vulnerability allows authenticated WordPress users with Contributor-level access or higher to modify plugin settings without proper authorization...

Jul 24, 2024
CVE-2024-6799
4.3

The YITH Essential Kit for WooCommerce #1 WordPress plugin has a missing capability check vulnerability that allows authenticated users with Subscribe...

Jul 19, 2024
CVE-2024-5997
4.3

The Duplica WordPress plugin has a missing capability check vulnerability that allows authenticated attackers with Subscriber-level access or higher t...

Jul 18, 2024
CVE-2024-5703
4.3

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to perform unauthorized API operations in the Email Sub...

Jul 17, 2024
CVE-2024-6033
4.3

This vulnerability in the Eventin WordPress plugin allows authenticated attackers with Contributor-level access or higher to import unauthorized data ...

Jul 17, 2024
CVE-2024-39596
4.3

CVE-2024-39596 is a missing authorization vulnerability in SAP Enable Now that allows authenticated authors to escalate privileges and access restrict...

Jul 9, 2024
CVE-2024-37175
4.3

CVE-2024-37175 is a missing authorization vulnerability in SAP CRM WebClient that allows authenticated users to escalate privileges and access sensiti...

Jul 9, 2024
CVE-2023-51375
4.3

This CVE describes a Missing Authorization vulnerability in the WordPress EmbedPress plugin that allows unauthorized users to perform actions they sho...

Jun 21, 2024
CVE-2024-1955
4.3

The Hide Dashboard Notifications WordPress plugin has a missing capability check vulnerability that allows authenticated users with contributor-level ...

Jun 21, 2024
CVE-2023-39993
4.3

This CVE describes a Missing Authorization vulnerability in the Wpmet Elements Kit Elementor addons plugin for WordPress. It allows unauthorized users...

Jun 19, 2024
CVE-2023-39922
4.3

This CVE describes a missing authorization vulnerability in the Avada WordPress theme that allows authenticated users to perform actions they shouldn'...

Jun 19, 2024
CVE-2023-47788
4.3

This CVE describes a Missing Authorization vulnerability in Automattic's Jetpack WordPress plugin that allows contributors to perform actions they sho...

Jun 19, 2024
CVE-2024-38504
4.3

This vulnerability allows guest users in JetBrains YouTrack to attach files to articles, which should be restricted. It affects YouTrack instances wit...

Jun 18, 2024
CVE-2023-51376
4.3

CVE-2023-51376 is a missing authorization vulnerability in the ProjectHuddle Client Site WordPress plugin that allows unauthorized users to access fun...

Jun 14, 2024
CVE-2023-35045
4.3

CVE-2023-35045 is a missing authorization vulnerability in the Fat Rat Collect WordPress plugin that allows unauthorized users to access functionality...

Jun 14, 2024
CVE-2023-51524
4.3

CVE-2023-51524 is a missing authorization vulnerability in the weForms WordPress plugin that allows unauthorized users to access form submission data ...

Jun 12, 2024
CVE-2023-47828
4.3

CVE-2023-47828 is a missing authorization vulnerability in the wpMandrill WordPress plugin that allows unauthorized users to access certain administra...

Jun 12, 2024
CVE-2023-52117
4.3

This CVE describes a Missing Authorization (Broken Access Control) vulnerability in the ProfileGrid WordPress plugin. It allows unauthorized users to ...

Jun 12, 2024
CVE-2023-51670
4.3

This CVE describes a Missing Authorization vulnerability in the FunnelKit Checkout WordPress plugin that allows authenticated users to activate arbitr...

Jun 12, 2024
CVE-2023-51526
4.3

This CVE describes a Missing Authorization vulnerability in the WordPress Simple Staff List plugin that allows unauthorized users to access restricted...

Jun 12, 2024
CVE-2024-32146
4.3

This CVE describes a Missing Authorization vulnerability in the Aspose.Words Exporter WordPress plugin that allows unauthorized users to access functi...

Jun 11, 2024
CVE-2023-52224
4.3

This CVE describes a Missing Authorization vulnerability in the Revolut Gateway for WooCommerce WordPress plugin. It allows unauthorized users to acce...

Jun 11, 2024
CVE-2024-23518
4.3

This CVE describes a Missing Authorization vulnerability in the ACF Photo Gallery Field WordPress plugin. It allows unauthorized users to access or mo...

Jun 11, 2024
CVE-2023-51519
4.3

This CVE describes a missing authorization vulnerability in the Soliloquy Slider WordPress plugin that allows unauthorized users to access functionali...

Jun 11, 2024
CVE-2024-35168
4.3

This CVE describes a Missing Authorization vulnerability in the WP Discourse WordPress plugin that allows unauthorized users to perform actions intend...

Jun 11, 2024
CVE-2024-35628
4.3

This CVE describes a Missing Authorization vulnerability in the Photo Gallery by 10Web WordPress plugin. It allows unauthorized users to perform actio...

Jun 11, 2024
CVE-2024-34824
4.3

This CVE describes a Missing Authorization vulnerability in the SportsPress WordPress plugin that allows unauthorized users to perform actions they sh...

Jun 11, 2024

About Missing Authorization (CWE-862)

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

Our database tracks 3,077 CVEs classified as CWE-862, with 231 rated critical and 877 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.3.

External reference: View CWE-862 on MITRE CWE →

Monitor Missing Authorization Vulnerabilities

Get alerted when new Missing Authorization CVEs affect your infrastructure.

Start Monitoring Free