CWE-862: Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Yearly Trend
Top Affected Vendors
All Missing Authorization CVEs (2,998)
This vulnerability allows authenticated attackers with at least Contributor-level access in WordPress to modify arbitrary site options, potentially es...
Jan 30, 2025CVE-2025-24734 is a missing authorization vulnerability in the CodeSolz Better Find and Replace WordPress plugin that allows authenticated attackers w...
Jan 27, 2025The Zox News WordPress theme has a vulnerability allowing authenticated users with Subscriber-level access or higher to modify arbitrary site options ...
Jan 26, 2025The WordPress WebinarPress plugin has a missing capability check vulnerability that allows authenticated users with subscriber-level access or higher ...
Jan 8, 2025This vulnerability in the WordPress WebinarPress plugin allows authenticated attackers with subscriber-level access or higher to create arbitrary file...
Jan 8, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to execute arbitrary code on the server. It affects sit...
Jan 8, 2025The Croma Music WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to mo...
Jan 7, 2025This vulnerability in the SMS Alert Order Notifications WooCommerce plugin allows authenticated attackers with subscriber-level access or higher to mo...
Jan 7, 2025CVE-2023-47179 is a missing authorization vulnerability in ByConsole WooODT Lite WordPress plugin that allows attackers to modify arbitrary site optio...
Jan 2, 2025This vulnerability allows attackers to escalate privileges in Webful Creations Computer Repair Shop WordPress plugin due to missing authorization chec...
Dec 31, 2024This CVE describes a Missing Authorization vulnerability in the Userpro WordPress plugin by DeluxeThemes. It allows authenticated users to update arbi...
Dec 31, 2024This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to upload arbitrary files to the server due to missing ...
Dec 24, 2024This vulnerability in the Custom Login Page Styler WordPress plugin allows authenticated attackers with Subscriber-level access or higher to escalate ...
Dec 24, 2024This CVE describes a Missing Authorization vulnerability in the WPLMS WordPress plugin by VibeThemes that allows attackers to access functionality not...
Dec 18, 2024The CRM WordPress Plugin – RepairBuddy plugin for WordPress has a privilege escalation vulnerability that allows authenticated attackers with subscr...
Dec 18, 2024This CVE describes a missing authorization vulnerability in the Quietly Insights WordPress plugin that allows authenticated attackers to update arbitr...
Dec 16, 2024This CVE describes a Missing Authorization vulnerability in CleanTalk's WordPress anti-spam plugin that allows attackers to bypass access controls and...
Dec 13, 2024The de:branding WordPress plugin has a privilege escalation vulnerability that allows authenticated users with subscriber-level access or higher to mo...
Dec 12, 2024The AI Quiz WordPress plugin has a privilege escalation vulnerability that allows authenticated users with Subscriber-level access or higher to modify...
Dec 6, 2024The AllAccessible WordPress plugin up to version 1.3.4 has a missing capability check that allows authenticated users with Subscriber-level access or ...
Dec 4, 2024The Victure RX1800 WiFi 6 Router has Telnet enabled by default with a root account that requires no password, allowing attackers on the local network ...
Dec 2, 2024This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to modify certain WordPress options, potentially escala...
Nov 19, 2024The PostX WordPress plugin (versions up to 4.1.16) allows authenticated attackers with Subscriber-level access or higher to install and activate arbit...
Nov 16, 2024This vulnerability in Jenkins Shared Library Version Override Plugin allows attackers with Item/Configure permission on a folder to bypass the Script ...
Nov 13, 2024The GPX Viewer WordPress plugin allows authenticated attackers with subscriber-level access or higher to create arbitrary files on the server due to m...
Nov 13, 2024The Th Shop Mania WordPress theme has a vulnerability that allows authenticated users with Subscriber-level access or higher to install arbitrary plug...
Nov 9, 2024This CVE describes a Missing Authorization vulnerability in the WordPress Login As Users plugin that allows attackers to bypass access controls and im...
Nov 1, 2024This CVE describes a Missing Authorization vulnerability in the Hercules Core WordPress plugin that allows authenticated users with subscriber-level p...
Nov 1, 2024The Masteriyo LMS WordPress plugin has an authorization vulnerability that allows authenticated users with student-level access or higher to modify us...
Oct 29, 2024This vulnerability in the Essential Addons for Elementor WordPress plugin allows attackers with access to the Elementor page builder to create registr...
Oct 16, 2024This vulnerability in Oracle BI Publisher allows authenticated attackers with low privileges to gain complete control over the system via HTTP request...
Oct 15, 2024This vulnerability in the WP Extended WordPress plugin allows authenticated attackers with Subscriber-level access or higher to modify arbitrary WordP...
Sep 4, 2024The WooCommerce Google Feed Manager WordPress plugin has a vulnerability that allows authenticated users with Contributor-level access or higher to de...
Aug 23, 2024The FundEngine WordPress plugin allows authenticated attackers with subscriber-level access or higher to escalate their privileges to administrator. T...
Aug 1, 2024This vulnerability in Windows Text Services Framework allows an attacker to gain SYSTEM-level privileges on affected Windows systems. It affects Windo...
Jul 10, 2024An unprotected WebSocket connection in stitionai/devika allows malicious websites to connect to the backend and issue commands as the authenticated us...
Jun 27, 2024This CVE describes a Missing Authorization vulnerability in the Bill Minozzi WP Tools WordPress plugin. It allows attackers to perform unauthorized ac...
Jun 21, 2024This CVE-2023-46148 is a Missing Authorization vulnerability in the Themify Ultra WordPress theme that allows authenticated users to change arbitrary ...
Jun 19, 2024This CVE describes a Missing Authorization vulnerability in the XStore WordPress theme that allows attackers to modify arbitrary WordPress options wit...
Jun 9, 2024This CVE describes a Missing Authorization vulnerability in the Finale Lite WordPress plugin that allows authenticated users with subscriber-level per...
Jun 9, 2024This CVE describes a Missing Authorization vulnerability in the NextMove Lite WordPress plugin that allows authenticated users with subscriber-level p...
Jun 9, 2024This vulnerability in Tutor LMS Pro WordPress plugin allows authenticated attackers with subscriber-level permissions or higher to bypass authorizatio...
May 16, 2024This vulnerability allows authenticated attackers to bypass authorization checks in NETGEAR ProSAFE Network Management System's createUser function, e...
May 3, 2024The WP Datepicker WordPress plugin has an authorization vulnerability that allows authenticated users with subscriber-level access or higher to modify...
May 2, 2024This CVE describes a Missing Authorization vulnerability in the Undsgn Uncode Core WordPress plugin that allows attackers to escalate privileges. Atta...
Apr 12, 2024This vulnerability in Jenkins docker-build-step Plugin allows attackers with Overall/Read permission to connect to arbitrary TCP or Unix socket URLs a...
Mar 6, 2024This vulnerability allows unauthenticated attackers to modify captive portal configurations on Peplink Balance Two routers. Attackers can change porta...
Dec 28, 2023CVE-2023-48375 is an authorization bypass vulnerability in SmartStar Software CWS web integration platform where authenticated normal users can execut...
Dec 15, 2023This vulnerability allows an attacker who can log into affected NEC clustering software to execute arbitrary commands with potentially elevated privil...
Nov 17, 2023The WP EXtra plugin for WordPress versions up to 6.2 has a missing capability check in the register() function, allowing authenticated attackers with ...
Oct 25, 2023About Missing Authorization (CWE-862)
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Our database tracks 2,998 CVEs classified as CWE-862, with 213 rated critical and 819 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.2.
External reference: View CWE-862 on MITRE CWE →
Monitor Missing Authorization Vulnerabilities
Get alerted when new Missing Authorization CVEs affect your infrastructure.
Start Monitoring Free