CWE-862: Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Yearly Trend
Top Affected Vendors
All Missing Authorization CVEs (2,997)
This CVE describes a missing authorization vulnerability in Ivanti security products that allows authenticated users with read-only admin privileges t...
Sep 9, 2025This vulnerability allows authenticated backend users in TYPO3 CMS to bypass authorization checks and directly access AJAX backend routes they shouldn...
Sep 9, 2025This vulnerability allows authenticated remote attackers to escalate privileges on ATEN eco DC installations by exploiting missing authorization check...
Sep 2, 2025The SEO Metrics WordPress plugin has a privilege escalation vulnerability that allows subscriber-level users to obtain administrator cookies and gain ...
Aug 2, 2025The Hydra Booking WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to ...
Jul 29, 2025The Dataverse Integration WordPress plugin versions 2.77 through 2.81 contain a privilege escalation vulnerability. Any authenticated user, even with ...
Jul 24, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to escalate their privileges to Administrator by exploi...
Jul 23, 2025The Ajax Load More WordPress plugin before version 2.8.1.2 lacks proper authorization checks in certain AJAX endpoints, allowing any authenticated use...
Jul 22, 2025The B1.lt WordPress plugin has an SQL injection vulnerability that allows authenticated attackers with Subscriber-level access or higher to execute ar...
Jul 18, 2025The aapanel WP Toolkit WordPress plugin versions 1.0 to 1.1 contain a privilege escalation vulnerability in the auto_login() function. Authenticated a...
Jul 18, 2025CVE-2025-49723 is a missing authorization vulnerability in the Windows StateRepository API that allows authenticated local attackers to tamper with sy...
Jul 8, 2025The WP Human Resource Management plugin for WordPress has a privilege escalation vulnerability that allows authenticated users with Employee-level acc...
Jul 4, 2025This CVE describes a Missing Authorization vulnerability in MDJM Mobile DJ Manager WordPress plugin that allows privilege escalation. Attackers can ex...
Jun 27, 2025This CVE describes a Missing Authorization vulnerability in the MaxiBlocks WordPress plugin that allows attackers to update arbitrary WordPress option...
Jun 7, 2025The Property plugin for WordPress (versions 1.0.5-1.0.6) contains a privilege escalation vulnerability where authenticated users with Author-level per...
May 27, 2025This vulnerability in the SMS Alert Order Notifications WooCommerce plugin allows authenticated attackers with Subscriber-level access or higher to im...
May 10, 2025This vulnerability allows attackers to enable SSH and Telnet services on Victure RX1800 routers without authentication. Attackers can gain administrat...
May 9, 2025This vulnerability in the Integração entre Eduzz e Woocommerce WordPress plugin allows authenticated attackers with Subscriber-level access or highe...
Apr 26, 2025The BM Content Builder WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to m...
Apr 25, 2025The Xelion Webchat WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to...
Apr 24, 2025This vulnerability allows attackers to update arbitrary WordPress options without proper authorization, leading to privilege escalation. It affects al...
Apr 17, 2025A missing authorization vulnerability in AWEOS GmbH's Email Notifications for Updates WordPress plugin allows attackers to escalate privileges. This a...
Apr 15, 2025The Embedder WordPress plugin (versions 1.3-1.3.5) contains a missing capability check that allows authenticated users with Subscriber-level access or...
Apr 10, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to install and activate arbitrary plugins on sites runn...
Apr 8, 2025The Email Notifications for Updates WordPress plugin has a privilege escalation vulnerability that allows authenticated attackers with Subscriber-leve...
Apr 5, 2025The Shopper Approved Reviews WordPress plugin versions 2.0-2.1 contain a privilege escalation vulnerability where authenticated users with Subscriber-...
Apr 2, 2025The Administrator Z WordPress plugin has an authorization bypass vulnerability that allows authenticated users with Subscriber-level access or higher ...
Mar 28, 2025This vulnerability allows attackers to update arbitrary WordPress options without proper authorization, leading to privilege escalation. It affects Wo...
Mar 27, 2025The WP Compress WordPress plugin has missing capability checks on AJAX functions, allowing authenticated users with Subscriber-level access or higher ...
Mar 26, 2025An improper access control vulnerability in Open WebUI v0.3.8 allows unauthenticated attackers to view and delete any files uploaded by users. Attacke...
Mar 20, 2025This vulnerability in the FoodBakery WordPress theme allows authenticated users with Subscriber-level access or higher to perform administrative actio...
Mar 19, 2025The uListing WordPress plugin has a vulnerability that allows authenticated attackers with subscriber-level access or higher to modify post metadata a...
Mar 15, 2025This vulnerability in the JobCareer WordPress theme allows authenticated users with Subscriber-level access or higher to perform administrative action...
Mar 14, 2025The SoundRise Music WordPress plugin has an authorization vulnerability that allows authenticated users with subscriber-level access to modify WordPre...
Mar 14, 2025CVE-2025-26661 is a missing authorization vulnerability in SAP NetWeaver ABAP Class Builder that allows authenticated attackers to escalate privileges...
Mar 11, 2025The UiPress Lite WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to m...
Mar 7, 2025This vulnerability in the WordPress Awesome Import & Export Plugin allows authenticated attackers with Subscriber-level access or higher to execute ar...
Mar 5, 2025The Animation Addons for Elementor Pro WordPress plugin has a vulnerability that allows authenticated attackers with Subscriber-level access or higher...
Mar 4, 2025The SurveyJS WordPress plugin has an arbitrary file deletion vulnerability that allows authenticated attackers with Subscriber-level access or higher ...
Mar 1, 2025The Cardealer WordPress theme allows authenticated attackers with subscriber-level access to escalate privileges by modifying default user roles. This...
Feb 28, 2025This vulnerability allows authenticated attackers with subscriber-level access or higher to change arbitrary users' email addresses in the GetBookings...
Feb 18, 2025A missing authorization vulnerability in Q-Free MaxTime allows authenticated low-privileged users to reset passwords, including administrator accounts...
Feb 12, 2025This vulnerability allows authenticated low-privileged attackers to add users to groups in Q-Free MaxTime systems via crafted HTTP requests. It affect...
Feb 12, 2025This vulnerability allows authenticated low-privileged users in Q-Free MaxTime systems to create new user accounts with arbitrary administrative privi...
Feb 12, 2025A missing authorization vulnerability in Q-Free MaxTime allows authenticated low-privileged users to escalate privileges by adding permissions to user...
Feb 12, 2025The Zox News WordPress theme has a vulnerability that allows authenticated users with Subscriber-level access or higher to modify critical WordPress o...
Feb 11, 2025This vulnerability allows remote attackers to execute arbitrary commands on Digiever DS-2105 Pro devices through command injection in the time_tzsetup...
Feb 3, 2025The ELEX WordPress HelpDesk & Customer Ticketing System plugin has a privilege escalation vulnerability that allows authenticated attackers with Subsc...
Feb 1, 2025The Media Manager for UserPro WordPress plugin has an authorization vulnerability that allows authenticated users (even with Subscriber role) to modif...
Jan 30, 2025The Royal Core WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to mod...
Jan 30, 2025About Missing Authorization (CWE-862)
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Our database tracks 2,997 CVEs classified as CWE-862, with 213 rated critical and 818 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.2.
External reference: View CWE-862 on MITRE CWE →
Monitor Missing Authorization Vulnerabilities
Get alerted when new Missing Authorization CVEs affect your infrastructure.
Start Monitoring Free