CWE-862: Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

2,998
Total CVEs
213
Critical
819
High
6.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
436
2025
1,552
2024
754
2023
138
2022
51

Top Affected Vendors

1 Google 107
2 Sap 31
3 Apple 27
4 Jenkins 22
5 Gitlab 16
6 Xwiki 12
7 Themeum 12
8 Wpdeveloper 11
9 Q Free 11
10 Oracle 9

All Missing Authorization CVEs (2,998)

CVE-2024-10591
8.8

This vulnerability allows authenticated attackers with at least Contributor-level access in WordPress to modify arbitrary site options, potentially es...

Jan 30, 2025
CVE-2025-24734
8.8

CVE-2025-24734 is a missing authorization vulnerability in the CodeSolz Better Find and Replace WordPress plugin that allows authenticated attackers w...

Jan 27, 2025
CVE-2024-11936
8.8

The Zox News WordPress theme has a vulnerability allowing authenticated users with Subscriber-level access or higher to modify arbitrary site options ...

Jan 26, 2025
CVE-2024-11271
8.8

The WordPress WebinarPress plugin has a missing capability check vulnerability that allows authenticated users with subscriber-level access or higher ...

Jan 8, 2025
CVE-2024-11270
8.8

This vulnerability in the WordPress WebinarPress plugin allows authenticated attackers with subscriber-level access or higher to create arbitrary file...

Jan 8, 2025
CVE-2024-11816
8.8

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to execute arbitrary code on the server. It affects sit...

Jan 8, 2025
CVE-2024-12202
8.8

The Croma Music WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to mo...

Jan 7, 2025
CVE-2024-11725
8.8

This vulnerability in the SMS Alert Order Notifications WooCommerce plugin allows authenticated attackers with subscriber-level access or higher to mo...

Jan 7, 2025
CVE-2023-47179
EPSS 17.8% 8.8

CVE-2023-47179 is a missing authorization vulnerability in ByConsole WooODT Lite WordPress plugin that allows attackers to modify arbitrary site optio...

Jan 2, 2025
CVE-2024-56061
8.8

This vulnerability allows attackers to escalate privileges in Webful Creations Computer Repair Shop WordPress plugin due to missing authorization chec...

Dec 31, 2024
CVE-2024-56211
8.8

This CVE describes a Missing Authorization vulnerability in the Userpro WordPress plugin by DeluxeThemes. It allows authenticated users to update arbi...

Dec 31, 2024
CVE-2024-12881
8.8

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to upload arbitrary files to the server due to missing ...

Dec 24, 2024
CVE-2024-12594
8.8

This vulnerability in the Custom Login Page Styler WordPress plugin allows authenticated attackers with Subscriber-level access or higher to escalate ...

Dec 24, 2024
CVE-2024-56048
8.8

This CVE describes a Missing Authorization vulnerability in the WPLMS WordPress plugin by VibeThemes that allows attackers to access functionality not...

Dec 18, 2024
CVE-2024-12259
8.8

The CRM WordPress Plugin – RepairBuddy plugin for WordPress has a privilege escalation vulnerability that allows authenticated attackers with subscr...

Dec 18, 2024
CVE-2024-54378
8.8

This CVE describes a missing authorization vulnerability in the Quietly Insights WordPress plugin that allows authenticated attackers to update arbitr...

Dec 16, 2024
CVE-2023-33996
8.8

This CVE describes a Missing Authorization vulnerability in CleanTalk's WordPress anti-spam plugin that allows attackers to bypass access controls and...

Dec 13, 2024
CVE-2024-11443
8.8

The de:branding WordPress plugin has a privilege escalation vulnerability that allows authenticated users with subscriber-level access or higher to mo...

Dec 12, 2024
CVE-2024-11323
8.8

The AI Quiz WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to modify...

Dec 6, 2024
CVE-2024-11643
8.8

The AllAccessible WordPress plugin up to version 1.3.4 has a missing capability check that allows authenticated users with Subscriber-level access or ...

Dec 4, 2024
CVE-2024-53938
8.8

The Victure RX1800 WiFi 6 Router has Telnet enabled by default with a root account that requires no password, allowing attackers on the local network ...

Dec 2, 2024
CVE-2024-11194
8.8

This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to modify certain WordPress options, potentially escala...

Nov 19, 2024
CVE-2024-10728
8.8

The PostX WordPress plugin (versions up to 4.1.16) allows authenticated attackers with Subscriber-level access or higher to install and activate arbit...

Nov 16, 2024
CVE-2024-52554
8.8

This vulnerability in Jenkins Shared Library Version Override Plugin allows attackers with Item/Configure permission on a folder to bypass the Script ...

Nov 13, 2024
CVE-2024-10629
8.8

The GPX Viewer WordPress plugin allows authenticated attackers with subscriber-level access or higher to create arbitrary files on the server due to m...

Nov 13, 2024
CVE-2024-10674
8.8

The Th Shop Mania WordPress theme has a vulnerability that allows authenticated users with Subscriber-level access or higher to install arbitrary plug...

Nov 9, 2024
CVE-2024-43982
8.8

This CVE describes a Missing Authorization vulnerability in the WordPress Login As Users plugin that allows attackers to bypass access controls and im...

Nov 1, 2024
CVE-2024-37232
8.8

This CVE describes a Missing Authorization vulnerability in the Hercules Core WordPress plugin that allows authenticated users with subscriber-level p...

Nov 1, 2024
CVE-2024-10008
8.8

The Masteriyo LMS WordPress plugin has an authorization vulnerability that allows authenticated users with student-level access or higher to modify us...

Oct 29, 2024
CVE-2021-4447
8.8

This vulnerability in the Essential Addons for Elementor WordPress plugin allows attackers with access to the Elementor page builder to create registr...

Oct 16, 2024
CVE-2024-21254
8.8

This vulnerability in Oracle BI Publisher allows authenticated attackers with low privileges to gain complete control over the system via HTTP request...

Oct 15, 2024
CVE-2024-8102
8.8

This vulnerability in the WP Extended WordPress plugin allows authenticated attackers with Subscriber-level access or higher to modify arbitrary WordP...

Sep 4, 2024
CVE-2024-7258
8.8

The WooCommerce Google Feed Manager WordPress plugin has a vulnerability that allows authenticated users with Contributor-level access or higher to de...

Aug 23, 2024
CVE-2024-6698
8.8

The FundEngine WordPress plugin allows authenticated attackers with subscriber-level access or higher to escalate their privileges to administrator. T...

Aug 1, 2024
CVE-2024-21417
8.8

This vulnerability in Windows Text Services Framework allows an attacker to gain SYSTEM-level privileges on affected Windows systems. It affects Windo...

Jul 10, 2024
CVE-2024-5820
8.8

An unprotected WebSocket connection in stitionai/devika allows malicious websites to connect to the backend and issue commands as the authenticated us...

Jun 27, 2024
CVE-2022-43453
8.8

This CVE describes a Missing Authorization vulnerability in the Bill Minozzi WP Tools WordPress plugin. It allows attackers to perform unauthorized ac...

Jun 21, 2024
CVE-2023-46148
8.8

This CVE-2023-46148 is a Missing Authorization vulnerability in the Themify Ultra WordPress theme that allows authenticated users to change arbitrary ...

Jun 19, 2024
CVE-2024-33564
8.8

This CVE describes a Missing Authorization vulnerability in the XStore WordPress theme that allows attackers to modify arbitrary WordPress options wit...

Jun 9, 2024
CVE-2024-30485
8.8

This CVE describes a Missing Authorization vulnerability in the Finale Lite WordPress plugin that allows authenticated users with subscriber-level per...

Jun 9, 2024
CVE-2024-25092
8.8

This CVE describes a Missing Authorization vulnerability in the NextMove Lite WordPress plugin that allows authenticated users with subscriber-level p...

Jun 9, 2024
CVE-2024-4352
8.8

This vulnerability in Tutor LMS Pro WordPress plugin allows authenticated attackers with subscriber-level permissions or higher to bypass authorizatio...

May 16, 2024
CVE-2023-38102
8.8

This vulnerability allows authenticated attackers to bypass authorization checks in NETGEAR ProSAFE Network Management System's createUser function, e...

May 3, 2024
CVE-2024-3895
8.8

The WP Datepicker WordPress plugin has an authorization vulnerability that allows authenticated users with subscriber-level access or higher to modify...

May 2, 2024
CVE-2023-51515
8.8

This CVE describes a Missing Authorization vulnerability in the Undsgn Uncode Core WordPress plugin that allows attackers to escalate privileges. Atta...

Apr 12, 2024
CVE-2024-2216
8.8

This vulnerability in Jenkins docker-build-step Plugin allows attackers with Overall/Read permission to connect to arbitrary TCP or Unix socket URLs a...

Mar 6, 2024
CVE-2023-49230
8.8

This vulnerability allows unauthenticated attackers to modify captive portal configurations on Peplink Balance Two routers. Attackers can change porta...

Dec 28, 2023
CVE-2023-48375
8.8

CVE-2023-48375 is an authorization bypass vulnerability in SmartStar Software CWS web integration platform where authenticated normal users can execut...

Dec 15, 2023
CVE-2023-39544
8.8

This vulnerability allows an attacker who can log into affected NEC clustering software to execute arbitrary commands with potentially elevated privil...

Nov 17, 2023
CVE-2023-5311
8.8

The WP EXtra plugin for WordPress versions up to 6.2 has a missing capability check in the register() function, allowing authenticated attackers with ...

Oct 25, 2023

About Missing Authorization (CWE-862)

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

Our database tracks 2,998 CVEs classified as CWE-862, with 213 rated critical and 819 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.2.

External reference: View CWE-862 on MITRE CWE →

Monitor Missing Authorization Vulnerabilities

Get alerted when new Missing Authorization CVEs affect your infrastructure.

Start Monitoring Free