CWE-862: Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Yearly Trend
Top Affected Vendors
All Missing Authorization CVEs (2,998)
The Jenkins Assembla Auth Plugin vulnerability allows users with EDIT permissions to gain Overall/Manage and Overall/SystemRead permissions even when ...
Sep 6, 2023This vulnerability allows authenticated users in Hazelcast clusters to bypass permission checks for executor services, enabling them to execute tasks ...
Jul 18, 2023POS Codekop v2.0 contains an authenticated remote code execution vulnerability via the filename parameter. This allows authenticated attackers to uplo...
Jun 23, 2023This vulnerability allows authenticated attackers with subscriber-level permissions or higher to bypass authorization checks in 16 XforWooCommerce Wor...
Jun 7, 2023An improper access control vulnerability in CONPROSYS HMI System (CHS) allows local users to escalate privileges to administrative level. This affects...
Jun 1, 2023CVE-2022-31595 is an authorization bypass vulnerability in SAP Financial Consolidation version 1010 that allows authenticated users to escalate privil...
Jun 14, 2022The Filr WordPress plugin before version 1.2.2.1 lacks proper authorization checks in two AJAX actions, allowing any authenticated user (even subscrib...
Jun 13, 2022CVE-2022-29611 is an authorization bypass vulnerability in SAP NetWeaver Application Server for ABAP and ABAP Platform that allows authenticated users...
May 11, 2022CVE-2021-44595 is a privilege escalation vulnerability in Wondershare Dr. Fone where unprivileged users can send crafted packets to ElevationService.e...
Apr 29, 2022This vulnerability in KVM's AMD SVM nested virtualization allows a malicious L1 guest to disable security intercepts for L2 guests, potentially enabli...
Mar 4, 2022The Jenkins SWAMP Plugin vulnerability allows attackers with Overall/Read permission to connect to arbitrary web servers using attacker-specified cred...
Feb 15, 2022CVE-2022-24450 is an access control vulnerability in NATS nats-server that allows any authenticated user to escalate privileges to the System account ...
Feb 8, 2022This vulnerability allows authenticated users with read-only privileges in FatPipe WARP, IPVPN, and MPVPN software to create administrative accounts, ...
Dec 15, 2021This vulnerability allows an attacker to pair Bluetooth devices with an Android device without user consent due to a missing permission check in the S...
Dec 15, 2021This vulnerability in SAP GRC Access Control allows authenticated users to bypass authorization checks, potentially escalating their privileges within...
Dec 14, 2021This vulnerability allows authenticated attackers to execute arbitrary code on Chamilo LMS servers by uploading a malicious .htaccess file through the...
Dec 3, 2021This vulnerability allows authenticated users with valid Ozone S3 credentials to impersonate any other user by creating specific OM requests. It affec...
Nov 19, 2021A vulnerability in KVM's AMD SVM nested virtualization allows a malicious L1 guest to enable AVIC support for L2 guests, bypassing proper validation. ...
Sep 29, 2021This vulnerability allows unauthenticated attackers to export all redirect rules from WordPress sites using the Simple 301 Redirects by BetterLinks pl...
Jun 14, 2021This vulnerability in the Simple 301 Redirects by BetterLinks WordPress plugin allows authenticated users to install arbitrary plugins on vulnerable s...
Jun 14, 2021This vulnerability in Tutor LMS WordPress plugin allows students to access unprotected AJAX endpoints, enabling them to modify course information and ...
Apr 5, 2021CVE-2021-21487 is an authorization bypass vulnerability in SAP Payment Engine version 500 that allows authenticated users to escalate privileges witho...
Mar 9, 2021This vulnerability allows authenticated devices in Eclipse Hono to receive command & control messages intended for other devices without proper author...
Jan 14, 2021This vulnerability allows authenticated WordPress users with at least author-level permissions to delete arbitrary files on the server through the Eas...
Jun 19, 2023This CVE describes a Missing Authorization vulnerability in the Tyler Moore Super Blank WordPress plugin that allows unauthorized users to delete arbi...
Dec 18, 2025This vulnerability in the Document Embedder WordPress plugin allows unauthenticated attackers to perform CRUD operations (create, read, update, delete...
Nov 5, 2025An unauthenticated attacker can read or modify metadata in Juniper Junos Space Security Director, potentially causing managed SRX Series devices to by...
Oct 9, 2025This CVE describes a Missing Authorization vulnerability in Md Yeasin Ul Haider's URL Shortener WordPress plugin that allows attackers to access funct...
Jul 16, 2025This vulnerability allows unauthorized users to access sensitive information via HTTP GET requests and modify critical service configurations via HTTP...
Jun 12, 2025CVE-2025-26961 is an unauthenticated broken access control vulnerability in the Fresh Framework WordPress plugin that allows attackers to bypass autho...
Mar 15, 2025The Host PHP Info WordPress plugin allows unauthenticated attackers to access sensitive server configuration information via the phpinfo() function wi...
Jan 7, 2025This CVE describes a Missing Authorization vulnerability in the Japanized For WooCommerce WordPress plugin that allows attackers to bypass access cont...
Dec 9, 2024This CVE describes a Missing Authorization vulnerability in the Post SMTP Mailer/Email Log WordPress plugin that allows unauthorized access to API end...
Jun 11, 2024This CVE describes a Missing Authorization vulnerability in the MultiVendorX WC Marketplace WordPress plugin. It allows unauthorized users to perform ...
Jun 11, 2024This CVE describes a Missing Authorization vulnerability in the LeadConnector WordPress plugin that allows unauthorized access to API endpoints. Attac...
May 6, 2024CVE-2024-25911 is a Missing Authorization vulnerability in the WordPress MoveTo plugin that allows unauthenticated attackers to delete arbitrary files...
Apr 16, 2024This vulnerability in spice-server allows unauthorized restart of KVM virtual machines in Red Hat's VDI product. It affects systems running specific v...
Aug 22, 2023The Kali Forms WordPress plugin up to version 2.1.1 contains an unauthenticated arbitrary post deletion vulnerability. Attackers can delete any WordPr...
Jun 7, 2023This vulnerability allows any user to download any file from the MeterSphere testing platform without authentication. It affects all MeterSphere users...
Mar 9, 2023CVE-2021-44793 is an authorization bypass vulnerability in Single Connect's sc-reports-ui module that allows unauthenticated remote attackers to acces...
Jan 27, 2022CVE-2021-21307 is an unauthenticated remote code execution vulnerability in Lucee Server's admin interface. Attackers can exploit this to execute arbi...
Feb 11, 2021CVE-2021-21246 is an authorization bypass vulnerability in OneDev's REST API that allows unauthenticated users to retrieve arbitrary user details incl...
Jan 15, 2021This vulnerability allows authenticated GitLab users with specific permissions to hijack project runners from other projects, potentially executing un...
Oct 29, 2025This vulnerability allows attackers to apply compliance frameworks to projects outside their authorized scope due to a missing authorization check in ...
Jun 20, 2025CVE-2025-42983 is a high-severity vulnerability in SAP Business Warehouse and SAP Plug-In Basis that allows authenticated attackers to delete arbitrar...
Jun 10, 2025This vulnerability in Azure Virtual Desktop allows authenticated attackers to escalate privileges through missing authorization checks. Attackers coul...
Apr 30, 2025The W3 Total Cache WordPress plugin up to version 2.8.1 lacks proper capability checks, allowing authenticated users with Subscriber-level access or h...
Jan 14, 2025This vulnerability in the WPForms WordPress plugin allows authenticated users with Subscriber-level access or higher to refund payments and cancel sub...
Dec 10, 2024This vulnerability in AMD RomArmor allows attackers to bypass security protections during system resume from standby, potentially accessing sensitive ...
Sep 6, 2025This vulnerability allows local attackers to bypass factory reset protections in Android's Settings app, potentially enabling unauthorized device rese...
Jan 28, 2025About Missing Authorization (CWE-862)
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Our database tracks 2,998 CVEs classified as CWE-862, with 213 rated critical and 819 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.2.
External reference: View CWE-862 on MITRE CWE →
Monitor Missing Authorization Vulnerabilities
Get alerted when new Missing Authorization CVEs affect your infrastructure.
Start Monitoring Free