CWE-863: Incorrect Authorization

The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.

710
Total CVEs
138
Critical
315
High
7.3
Avg CVSS
3
In CISA KEV

Yearly Trend

2026
77
2025
260
2024
164
2023
97
2022
35

Top Affected Vendors

1 Oracle 34
2 Apple 26
3 Adobe 23
4 Google 19
5 Mattermost 18
6 Gitlab 16
7 Ibm 13
8 Apache 10
9 Wso2 7
10 Lunary 7

All Incorrect Authorization CVEs (710)

CVE-2021-1086
7.1

This vulnerability in NVIDIA vGPU driver allows guest virtual machines to access unauthorized resources on the host system, potentially leading to dat...

Apr 29, 2021
CVE-2025-26330
7.0

Dell PowerScale OneFS versions 9.4.0.0 through 9.10.0.1 contain an incorrect authorization vulnerability. An unauthenticated attacker with local acces...

Apr 10, 2025
CVE-2021-20188
7.0

A privilege escalation vulnerability in Podman allows non-root users inside privileged containers to access any file, including root-owned files. This...

Feb 11, 2021
CVE-2025-68933
6.9

This CVE allows non-admin moderators with post ownership transfer permissions to change ownership of posts in private messages and restricted categori...

Jan 28, 2026
CVE-2025-68129
6.8

Auth0-PHP SDK versions 8.0.0 through 8.17.0 improperly validate audience claims in access tokens, allowing ID tokens to be accepted as access tokens. ...

Dec 17, 2025
CVE-2025-54838
6.8

An incorrect authorization vulnerability in FortiPortal versions 7.4.0 through 7.4.5 allows authenticated attackers to reboot shared FortiGate devices...

Dec 9, 2025
CVE-2024-54916
6.8

This vulnerability in Telegram Android allows a physically proximate attacker to bypass the app's passcode authentication and gain unauthorized access...

Feb 11, 2025
CVE-2024-6979
6.8

CVE-2024-6979 is a broken access control vulnerability in AXIS OS that allows less-privileged operator or viewer accounts to gain elevated privileges ...

Sep 10, 2024
CVE-2024-5714
6.8

In lunary-ai/lunary version 1.2.4, an improper access control vulnerability allows team members with management permissions to manipulate project iden...

Jun 27, 2024
CVE-2025-5187
6.7

A vulnerability in Kubernetes' NodeRestriction admission controller allows node users to delete their own node objects by manipulating OwnerReferences...

Aug 27, 2025
CVE-2024-7039
6.7

This vulnerability allows an authenticated admin user to delete other administrators through direct API calls, bypassing UI restrictions. It affects o...

Mar 20, 2025
CVE-2026-28715
6.5

CVE-2026-28715 is an improper authorization vulnerability in Acronis Cyber Protect 17 that allows unauthorized access to sensitive information. Attack...

Mar 6, 2026
CVE-2026-26012
6.5

In vaultwarden versions before 1.35.3, any organization member can access all ciphers (password entries) within their organization, bypassing collecti...

Feb 11, 2026
CVE-2026-25729
6.5

DeepAudit versions 3.0.4 and earlier contain an improper access control vulnerability in the /api/v1/users/ endpoint that allows any authenticated use...

Feb 6, 2026
CVE-2025-70997
6.5

This vulnerability in eladmin v2.7 and earlier allows attackers to reset any user's password regardless of their permission level. Attackers can gain ...

Feb 4, 2026
CVE-2026-24742
6.5

This CVE allows non-admin moderators in Discourse to view sensitive information in staff action logs that should be restricted to administrators only....

Jan 28, 2026
CVE-2025-69218
6.5

This CVE allows moderators in Discourse to access the 'top_uploads' admin report, which should be restricted to administrators only. The report reveal...

Jan 28, 2026
CVE-2025-68666
6.5

This CVE allows Discourse moderators to view user archives containing private topic/post content, violating confidentiality. It affects Discourse inst...

Jan 28, 2026
CVE-2026-1514
6.5

CVE-2026-1514 is an incorrect authorization vulnerability in 2100 Technology's Official Document Management System that allows authenticated attackers...

Jan 28, 2026
CVE-2026-23964
6.5

This CVE describes an insecure direct object reference vulnerability in Mastodon's web push subscription update endpoint. Authenticated users can tamp...

Jan 22, 2026
CVE-2025-59020
6.5

This vulnerability allows authenticated TYPO3 backend users with write permissions to bypass field-level access controls during record creation. By ex...

Jan 13, 2026
CVE-2025-66581
6.5

Frappe LMS versions before 2.41.0 have an authorization bypass vulnerability where authenticated users can perform actions beyond their assigned roles...

Dec 5, 2025
CVE-2025-65900
6.5

CVE-2025-65900 is an incorrect access control vulnerability in Kalmia CMS that allows authenticated users with basic read permissions to retrieve sens...

Dec 4, 2025
CVE-2025-66424
6.5

Tryton trytond versions before 7.6.11, 7.4.21, 7.0.40, and 6.0.70 fail to enforce access controls during data export operations. This allows authentic...

Nov 30, 2025
CVE-2025-59111
6.5

Windu CMS version 4.1 has a broken access control vulnerability in user editing functionality that allows privileged users to delete Super Admin accou...

Nov 18, 2025
CVE-2025-34273
6.5

Nagios Log Server versions before 2024R2.0.3 have an authorization flaw that lets non-admin users delete global dashboards. This affects all organizat...

Oct 30, 2025
CVE-2025-54267
6.5

This CVE describes an incorrect authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security controls and gai...

Oct 14, 2025
CVE-2025-27236
6.5

A Zabbix API vulnerability allows authenticated users to search other users in their group and access restricted field values they shouldn't have perm...

Oct 3, 2025
CVE-2025-59714
6.5

This vulnerability allows group administrators who are not Grouper system administrators to configure loader jobs in Internet2 Grouper. This improper ...

Sep 19, 2025
CVE-2025-43784
6.5

This CVE describes an improper access control vulnerability in Liferay Portal and DXP where guest users (unauthenticated users) can access object entr...

Sep 10, 2025
CVE-2025-25010
6.5

This CVE describes an incorrect authorization vulnerability in Kibana where the built-in reporting_user role has excessive permissions, allowing it to...

Aug 28, 2025
CVE-2025-57728
6.5

This vulnerability in JetBrains IntelliJ IDEA allows Code With Me guests to discover hidden files on the host system due to improper access control. I...

Aug 20, 2025
CVE-2025-54583
6.5

GitProxy versions 1.19.1 and below contain an authorization bypass vulnerability that allows users to push code to remote repositories without trigger...

Jul 30, 2025
CVE-2025-6549
6.5

An incorrect authorization vulnerability in Juniper Junos OS on SRX Series allows unauthenticated attackers to access the J-Web management interface t...

Jul 11, 2025
CVE-2025-40669
6.5

This vulnerability in TCMAN's GIM v11 allows unauthenticated attackers to modify user permissions via a specific POST request. Attackers can escalate ...

Jun 9, 2025
CVE-2025-48948
6.5

CVE-2025-48948 is an authorization bypass vulnerability in Navidrome music server where authenticated regular users can perform administrator-only tra...

May 30, 2025
CVE-2024-55965
6.5

Appsmith versions before 1.51 have an incorrect access control vulnerability where users with 'App Viewer' permissions can view development informatio...

Mar 26, 2025
CVE-2024-10273
6.5

This vulnerability allows users with viewer roles in lunary-ai/lunary to modify models owned by other users due to missing privilege checks in the PAT...

Mar 20, 2025
CVE-2025-26526
6.5

This vulnerability allows users to bypass Separate Groups mode restrictions in Moodle's Feedback activities, enabling unauthorized viewing or deletion...

Feb 24, 2025
CVE-2025-23053
6.5

This CVE describes a privilege escalation vulnerability in HPE Aruba Networking Fabric Composer's web management interface. Authenticated low-privileg...

Jan 28, 2025
CVE-2025-21560
6.5

This vulnerability in Oracle Agile PLM Framework allows authenticated attackers with low privileges to access sensitive data via HTTP. It affects orga...

Jan 21, 2025
CVE-2024-57677
6.5

This vulnerability allows unauthenticated attackers to modify WAN service settings on D-Link DIR-816 routers via a crafted POST request to form2Wan.cg...

Jan 16, 2025
CVE-2024-57679
6.5

This vulnerability allows unauthenticated attackers to remotely configure the 2.4G and 5G repeater services on affected D-Link routers. Attackers can ...

Jan 16, 2025
CVE-2024-56114
6.5

CVE-2024-56114 is an improper authorization vulnerability in Canlineapp Online 1.1 that allows users with Auditor role to create audit templates, a fe...

Jan 9, 2025
CVE-2024-53949
6.5

Apache Superset has an improper authorization vulnerability when FAB_ADD_SECURITY_API is enabled (disabled by default). This allows lower-privilege us...

Dec 9, 2024
CVE-2024-12196
6.5

This vulnerability allows authenticated users in Devolutions Server to view password history entries without proper authorization. Attackers with vali...

Dec 4, 2024
CVE-2024-11669
6.5

This vulnerability in GitLab CE/EE allows attackers with valid API tokens to access sensitive data beyond their intended permissions due to overly bro...

Nov 26, 2024
CVE-2024-44765
6.5

This CVE describes an improper authorization vulnerability in CloudPanel that allows low-privilege users to bypass access controls. Attackers can gain...

Nov 8, 2024
CVE-2024-20482
6.5

This vulnerability allows authenticated users with custom read-only roles to elevate privileges on Cisco Secure Firewall Management Center devices. At...

Oct 23, 2024
CVE-2024-45132
6.5

CVE-2024-45132 is an improper authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security controls and escal...

Oct 10, 2024

About Incorrect Authorization (CWE-863)

The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.

Our database tracks 710 CVEs classified as CWE-863, with 138 rated critical and 315 rated high severity. The average CVSS score for Incorrect Authorization vulnerabilities is 7.3.

External reference: View CWE-863 on MITRE CWE →

Monitor Incorrect Authorization Vulnerabilities

Get alerted when new Incorrect Authorization CVEs affect your infrastructure.

Start Monitoring Free