CWE-862: Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

2,997
Total CVEs
213
Critical
818
High
6.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
436
2025
1,552
2024
754
2023
138
2022
51

Top Affected Vendors

1 Google 107
2 Sap 31
3 Apple 27
4 Jenkins 22
5 Gitlab 16
6 Xwiki 12
7 Themeum 12
8 Wpdeveloper 11
9 Q Free 11
10 Oracle 9

All Missing Authorization CVEs (2,997)

CVE-2025-55141
8.8

This CVE describes a missing authorization vulnerability in Ivanti security products that allows authenticated users with read-only admin privileges t...

Sep 9, 2025
CVE-2025-59017
8.8

This vulnerability allows authenticated backend users in TYPO3 CMS to bypass authorization checks and directly access AJAX backend routes they shouldn...

Sep 9, 2025
CVE-2025-6685
8.8

This vulnerability allows authenticated remote attackers to escalate privileges on ATEN eco DC installations by exploiting missing authorization check...

Sep 2, 2025
CVE-2025-6754
8.8

The SEO Metrics WordPress plugin has a privilege escalation vulnerability that allows subscriber-level users to obtain administrator cookies and gain ...

Aug 2, 2025
CVE-2025-7689
8.8

The Hydra Booking WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to ...

Jul 29, 2025
CVE-2025-7695
8.8

The Dataverse Integration WordPress plugin versions 2.77 through 2.81 contain a privilege escalation vulnerability. Any authenticated user, even with ...

Jul 24, 2025
CVE-2025-6190
8.8

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to escalate their privileges to Administrator by exploi...

Jul 23, 2025
CVE-2015-10140
EPSS 50.3% 8.8

The Ajax Load More WordPress plugin before version 2.8.1.2 lacks proper authorization checks in certain AJAX endpoints, allowing any authenticated use...

Jul 22, 2025
CVE-2025-6718
8.8

The B1.lt WordPress plugin has an SQL injection vulnerability that allows authenticated attackers with Subscriber-level access or higher to execute ar...

Jul 18, 2025
CVE-2025-6813
8.8

The aapanel WP Toolkit WordPress plugin versions 1.0 to 1.1 contain a privilege escalation vulnerability in the auto_login() function. Authenticated a...

Jul 18, 2025
CVE-2025-49723
8.8

CVE-2025-49723 is a missing authorization vulnerability in the Windows StateRepository API that allows authenticated local attackers to tamper with sy...

Jul 8, 2025
CVE-2025-5953
8.8

The WP Human Resource Management plugin for WordPress has a privilege escalation vulnerability that allows authenticated users with Employee-level acc...

Jul 4, 2025
CVE-2025-52824
8.8

This CVE describes a Missing Authorization vulnerability in MDJM Mobile DJ Manager WordPress plugin that allows privilege escalation. Attackers can ex...

Jun 27, 2025
CVE-2025-47601
8.8

This CVE describes a Missing Authorization vulnerability in the MaxiBlocks WordPress plugin that allows attackers to update arbitrary WordPress option...

Jun 7, 2025
CVE-2025-5117
8.8

The Property plugin for WordPress (versions 1.0.5-1.0.6) contains a privilege escalation vulnerability where authenticated users with Author-level per...

May 27, 2025
CVE-2025-3876
8.8

This vulnerability in the SMS Alert Order Notifications WooCommerce plugin allows authenticated attackers with Subscriber-level access or higher to im...

May 10, 2025
CVE-2025-28202
8.8

This vulnerability allows attackers to enable SSH and Telnet services on Victure RX1800 routers without authentication. Attackers can gain administrat...

May 9, 2025
CVE-2025-3906
8.8

This vulnerability in the Integração entre Eduzz e Woocommerce WordPress plugin allows authenticated attackers with Subscriber-level access or highe...

Apr 26, 2025
CVE-2025-1279
8.8

The BM Content Builder WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to m...

Apr 25, 2025
CVE-2025-3058
8.8

The Xelion Webchat WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to...

Apr 24, 2025
CVE-2025-39533
8.8

This vulnerability allows attackers to update arbitrary WordPress options without proper authorization, leading to privilege escalation. It affects al...

Apr 17, 2025
CVE-2025-26741
8.8

A missing authorization vulnerability in AWEOS GmbH's Email Notifications for Updates WordPress plugin allows attackers to escalate privileges. This a...

Apr 15, 2025
CVE-2025-3417
8.8

The Embedder WordPress plugin (versions 1.3-1.3.5) contains a missing capability check that allows authenticated users with Subscriber-level access or...

Apr 10, 2025
CVE-2025-2807
8.8

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to install and activate arbitrary plugins on sites runn...

Apr 8, 2025
CVE-2025-2933
8.8

The Email Notifications for Updates WordPress plugin has a privilege escalation vulnerability that allows authenticated attackers with Subscriber-leve...

Apr 5, 2025
CVE-2025-3063
8.8

The Shopper Approved Reviews WordPress plugin versions 2.0-2.1 contain a privilege escalation vulnerability where authenticated users with Subscriber-...

Apr 2, 2025
CVE-2025-2815
8.8

The Administrator Z WordPress plugin has an authorization bypass vulnerability that allows authenticated users with Subscriber-level access or higher ...

Mar 28, 2025
CVE-2025-30772
8.8

This vulnerability allows attackers to update arbitrary WordPress options without proper authorization, leading to privilege escalation. It affects Wo...

Mar 27, 2025
CVE-2025-2110
8.8

The WP Compress WordPress plugin has missing capability checks on AJAX functions, allowing authenticated users with Subscriber-level access or higher ...

Mar 26, 2025
CVE-2024-7043
8.8

An improper access control vulnerability in Open WebUI v0.3.8 allows unauthenticated attackers to view and delete any files uploaded by users. Attacke...

Mar 20, 2025
CVE-2024-12920
8.8

This vulnerability in the FoodBakery WordPress theme allows authenticated users with Subscriber-level access or higher to perform administrative actio...

Mar 19, 2025
CVE-2025-1657
8.8

The uListing WordPress plugin has a vulnerability that allows authenticated attackers with subscriber-level access or higher to modify post metadata a...

Mar 15, 2025
CVE-2024-12810
8.8

This vulnerability in the JobCareer WordPress theme allows authenticated users with Subscriber-level access or higher to perform administrative action...

Mar 14, 2025
CVE-2025-2103
8.8

The SoundRise Music WordPress plugin has an authorization vulnerability that allows authenticated users with subscriber-level access to modify WordPre...

Mar 14, 2025
CVE-2025-26661
8.8

CVE-2025-26661 is a missing authorization vulnerability in SAP NetWeaver ABAP Class Builder that allows authenticated attackers to escalate privileges...

Mar 11, 2025
CVE-2025-1309
8.8

The UiPress Lite WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to m...

Mar 7, 2025
CVE-2024-13232
8.8

This vulnerability in the WordPress Awesome Import & Export Plugin allows authenticated attackers with Subscriber-level access or higher to execute ar...

Mar 5, 2025
CVE-2025-1639
8.8

The Animation Addons for Elementor Pro WordPress plugin has a vulnerability that allows authenticated attackers with Subscriber-level access or higher...

Mar 4, 2025
CVE-2024-12544
8.8

The SurveyJS WordPress plugin has an arbitrary file deletion vulnerability that allows authenticated attackers with Subscriber-level access or higher ...

Mar 1, 2025
CVE-2025-1682
8.8

The Cardealer WordPress theme allows authenticated attackers with subscriber-level access to escalate privileges by modifying default user roles. This...

Feb 28, 2025
CVE-2024-13677
8.8

This vulnerability allows authenticated attackers with subscriber-level access or higher to change arbitrary users' email addresses in the GetBookings...

Feb 18, 2025
CVE-2025-26378
8.8

A missing authorization vulnerability in Q-Free MaxTime allows authenticated low-privileged users to reset passwords, including administrator accounts...

Feb 12, 2025
CVE-2025-26371
8.8

This vulnerability allows authenticated low-privileged attackers to add users to groups in Q-Free MaxTime systems via crafted HTTP requests. It affect...

Feb 12, 2025
CVE-2025-26375
8.8

This vulnerability allows authenticated low-privileged users in Q-Free MaxTime systems to create new user accounts with arbitrary administrative privi...

Feb 12, 2025
CVE-2025-26369
8.8

A missing authorization vulnerability in Q-Free MaxTime allows authenticated low-privileged users to escalate privileges by adding permissions to user...

Feb 12, 2025
CVE-2024-13643
8.8

The Zox News WordPress theme has a vulnerability that allows authenticated users with Subscriber-level access or higher to modify critical WordPress o...

Feb 11, 2025
CVE-2023-52163
KEV EPSS 69.2% 8.8

This vulnerability allows remote attackers to execute arbitrary commands on Digiever DS-2105 Pro devices through command injection in the time_tzsetup...

Feb 3, 2025
CVE-2024-12171
8.8

The ELEX WordPress HelpDesk & Customer Ticketing System plugin has a privilege escalation vulnerability that allows authenticated attackers with Subsc...

Feb 1, 2025
CVE-2024-12821
8.8

The Media Manager for UserPro WordPress plugin has an authorization vulnerability that allows authenticated users (even with Subscriber role) to modif...

Jan 30, 2025
CVE-2024-12129
8.8

The Royal Core WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to mod...

Jan 30, 2025

About Missing Authorization (CWE-862)

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

Our database tracks 2,997 CVEs classified as CWE-862, with 213 rated critical and 818 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.2.

External reference: View CWE-862 on MITRE CWE →

Monitor Missing Authorization Vulnerabilities

Get alerted when new Missing Authorization CVEs affect your infrastructure.

Start Monitoring Free