CWE-862: Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

2,998
Total CVEs
213
Critical
819
High
6.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
436
2025
1,552
2024
754
2023
138
2022
51

Top Affected Vendors

1 Google 107
2 Sap 31
3 Apple 27
4 Jenkins 22
5 Gitlab 16
6 Xwiki 12
7 Themeum 12
8 Wpdeveloper 11
9 Q Free 11
10 Oracle 9

All Missing Authorization CVEs (2,998)

CVE-2023-41945
8.8

The Jenkins Assembla Auth Plugin vulnerability allows users with EDIT permissions to gain Overall/Manage and Overall/SystemRead permissions even when ...

Sep 6, 2023
CVE-2023-33265
8.8

This vulnerability allows authenticated users in Hazelcast clusters to bypass permission checks for executor services, enabling them to execute tasks ...

Jul 18, 2023
CVE-2023-36348
8.8

POS Codekop v2.0 contains an authenticated remote code execution vulnerability via the filename parameter. This allows authenticated attackers to uplo...

Jun 23, 2023
CVE-2021-4337
8.8

This vulnerability allows authenticated attackers with subscriber-level permissions or higher to bypass authorization checks in 16 XforWooCommerce Wor...

Jun 7, 2023
CVE-2023-28657
8.8

An improper access control vulnerability in CONPROSYS HMI System (CHS) allows local users to escalate privileges to administrative level. This affects...

Jun 1, 2023
CVE-2022-31595
8.8

CVE-2022-31595 is an authorization bypass vulnerability in SAP Financial Consolidation version 1010 that allows authenticated users to escalate privil...

Jun 14, 2022
CVE-2022-1777
8.8

The Filr WordPress plugin before version 1.2.2.1 lacks proper authorization checks in two AJAX actions, allowing any authenticated user (even subscrib...

Jun 13, 2022
CVE-2022-29611
8.8

CVE-2022-29611 is an authorization bypass vulnerability in SAP NetWeaver Application Server for ABAP and ABAP Platform that allows authenticated users...

May 11, 2022
CVE-2021-44595
8.8

CVE-2021-44595 is a privilege escalation vulnerability in Wondershare Dr. Fone where unprivileged users can send crafted packets to ElevationService.e...

Apr 29, 2022
CVE-2021-3656
8.8

This vulnerability in KVM's AMD SVM nested virtualization allows a malicious L1 guest to disable security intercepts for L2 guests, potentially enabli...

Mar 4, 2022
CVE-2022-25211
8.8

The Jenkins SWAMP Plugin vulnerability allows attackers with Overall/Read permission to connect to arbitrary web servers using attacker-specified cred...

Feb 15, 2022
CVE-2022-24450
8.8

CVE-2022-24450 is an access control vulnerability in NATS nats-server that allows any authenticated user to escalate privileges to the System account ...

Feb 8, 2022
CVE-2021-27859
8.8

This vulnerability allows authenticated users with read-only privileges in FatPipe WARP, IPVPN, and MPVPN software to create administrative accounts, ...

Dec 15, 2021
CVE-2021-0965
8.8

This vulnerability allows an attacker to pair Bluetooth devices with an Android device without user consent due to a missing permission check in the S...

Dec 15, 2021
CVE-2021-44233
8.8

This vulnerability in SAP GRC Access Control allows authenticated users to bypass authorization checks, potentially escalating their privileges within...

Dec 14, 2021
CVE-2021-35413
8.8

This vulnerability allows authenticated attackers to execute arbitrary code on Chamilo LMS servers by uploading a malicious .htaccess file through the...

Dec 3, 2021
CVE-2021-39236
8.8

This vulnerability allows authenticated users with valid Ozone S3 credentials to impersonate any other user by creating specific OM requests. It affec...

Nov 19, 2021
CVE-2021-3653
8.8

A vulnerability in KVM's AMD SVM nested virtualization allows a malicious L1 guest to enable AVIC support for L2 guests, bypassing proper validation. ...

Sep 29, 2021
CVE-2021-24352
8.8

This vulnerability allows unauthenticated attackers to export all redirect rules from WordPress sites using the Simple 301 Redirects by BetterLinks pl...

Jun 14, 2021
CVE-2021-24354
8.8

This vulnerability in the Simple 301 Redirects by BetterLinks WordPress plugin allows authenticated users to install arbitrary plugins on vulnerable s...

Jun 14, 2021
CVE-2021-24184
8.8

This vulnerability in Tutor LMS WordPress plugin allows students to access unprotected AJAX endpoints, enabling them to modify course information and ...

Apr 5, 2021
CVE-2021-21487
8.8

CVE-2021-21487 is an authorization bypass vulnerability in SAP Payment Engine version 500 that allows authenticated users to escalate privileges witho...

Mar 9, 2021
CVE-2020-27220
8.8

This vulnerability allows authenticated devices in Eclipse Hono to receive command & control messages intended for other devices without proper author...

Jan 14, 2021
CVE-2022-46850
8.7

This vulnerability allows authenticated WordPress users with at least author-level permissions to delete arbitrary files on the server through the Eas...

Jun 19, 2023
CVE-2025-54741
8.6

This CVE describes a Missing Authorization vulnerability in the Tyler Moore Super Blank WordPress plugin that allows unauthorized users to delete arbi...

Dec 18, 2025
CVE-2025-12384
8.6

This vulnerability in the Document Embedder WordPress plugin allows unauthenticated attackers to perform CRUD operations (create, read, update, delete...

Nov 5, 2025
CVE-2025-59968
8.6

An unauthenticated attacker can read or modify metadata in Juniper Junos Space Security Director, potentially causing managed SRX Series devices to by...

Oct 9, 2025
CVE-2025-28965
8.6

This CVE describes a Missing Authorization vulnerability in Md Yeasin Ul Haider's URL Shortener WordPress plugin that allows attackers to access funct...

Jul 16, 2025
CVE-2025-49181
8.6

This vulnerability allows unauthorized users to access sensitive information via HTTP GET requests and modify critical service configurations via HTTP...

Jun 12, 2025
CVE-2025-26961
8.6

CVE-2025-26961 is an unauthenticated broken access control vulnerability in the Fresh Framework WordPress plugin that allows attackers to bypass autho...

Mar 15, 2025
CVE-2024-12535
EPSS 17.4% 8.6

The Host PHP Info WordPress plugin allows unauthenticated attackers to access sensitive server configuration information via the phpinfo() function wi...

Jan 7, 2025
CVE-2023-47698
8.6

This CVE describes a Missing Authorization vulnerability in the Japanized For WooCommerce WordPress plugin that allows attackers to bypass access cont...

Dec 9, 2024
CVE-2023-52233
8.6

This CVE describes a Missing Authorization vulnerability in the Post SMTP Mailer/Email Log WordPress plugin that allows unauthorized access to API end...

Jun 11, 2024
CVE-2024-24703
8.6

This CVE describes a Missing Authorization vulnerability in the MultiVendorX WC Marketplace WordPress plugin. It allows unauthorized users to perform ...

Jun 11, 2024
CVE-2024-34378
8.6

This CVE describes a Missing Authorization vulnerability in the LeadConnector WordPress plugin that allows unauthorized access to API endpoints. Attac...

May 6, 2024
CVE-2024-25911
8.6

CVE-2024-25911 is a Missing Authorization vulnerability in the WordPress MoveTo plugin that allows unauthenticated attackers to delete arbitrary files...

Apr 16, 2024
CVE-2020-23793
8.6

This vulnerability in spice-server allows unauthorized restart of KVM virtual machines in Red Hat's VDI product. It affects systems running specific v...

Aug 22, 2023
CVE-2020-36712
8.6

The Kali Forms WordPress plugin up to version 2.1.1 contains an unauthenticated arbitrary post deletion vulnerability. Attackers can delete any WordPr...

Jun 7, 2023
CVE-2023-25573
8.6

This vulnerability allows any user to download any file from the MeterSphere testing platform without authentication. It affects all MeterSphere users...

Mar 9, 2023
CVE-2021-44793
8.6

CVE-2021-44793 is an authorization bypass vulnerability in Single Connect's sc-reports-ui module that allows unauthenticated remote attackers to acces...

Jan 27, 2022
CVE-2021-21307
8.6

CVE-2021-21307 is an unauthenticated remote code execution vulnerability in Lucee Server's admin interface. Attackers can exploit this to execute arbi...

Feb 11, 2021
CVE-2021-21246
8.6

CVE-2021-21246 is an authorization bypass vulnerability in OneDev's REST API that allows unauthenticated users to retrieve arbitrary user details incl...

Jan 15, 2021
CVE-2025-11702
8.5

This vulnerability allows authenticated GitLab users with specific permissions to hijack project runners from other projects, potentially executing un...

Oct 29, 2025
CVE-2025-5121
8.5

This vulnerability allows attackers to apply compliance frameworks to projects outside their authorized scope due to a missing authorization check in ...

Jun 20, 2025
CVE-2025-42983
8.5

CVE-2025-42983 is a high-severity vulnerability in SAP Business Warehouse and SAP Plug-In Basis that allows authenticated attackers to delete arbitrar...

Jun 10, 2025
CVE-2025-21416
8.5

This vulnerability in Azure Virtual Desktop allows authenticated attackers to escalate privileges through missing authorization checks. Attackers coul...

Apr 30, 2025
CVE-2024-12365
EPSS 13.8% 8.5

The W3 Total Cache WordPress plugin up to version 2.8.1 lacks proper capability checks, allowing authenticated users with Subscriber-level access or h...

Jan 14, 2025
CVE-2024-11205
8.5

This vulnerability in the WPForms WordPress plugin allows authenticated users with Subscriber-level access or higher to refund payments and cancel sub...

Dec 10, 2024
CVE-2024-36326
8.4

This vulnerability in AMD RomArmor allows attackers to bypass security protections during system resume from standby, potentially accessing sensitive ...

Sep 6, 2025
CVE-2024-40677
8.4

This vulnerability allows local attackers to bypass factory reset protections in Android's Settings app, potentially enabling unauthorized device rese...

Jan 28, 2025

About Missing Authorization (CWE-862)

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

Our database tracks 2,998 CVEs classified as CWE-862, with 213 rated critical and 819 rated high severity. The average CVSS score for Missing Authorization vulnerabilities is 6.2.

External reference: View CWE-862 on MITRE CWE →

Monitor Missing Authorization Vulnerabilities

Get alerted when new Missing Authorization CVEs affect your infrastructure.

Start Monitoring Free