CWE-863: Incorrect Authorization

The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.

711
Total CVEs
139
Critical
315
High
7.3
Avg CVSS
3
In CISA KEV

Yearly Trend

2026
77
2025
260
2024
164
2023
97
2022
35

Top Affected Vendors

1 Oracle 34
2 Apple 26
3 Adobe 23
4 Google 19
5 Mattermost 18
6 Gitlab 16
7 Ibm 13
8 Apache 10
9 Wso2 7
10 Lunary 7

All Incorrect Authorization CVEs (711)

CVE-2024-45132
6.5

CVE-2024-45132 is an improper authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security controls and escal...

Oct 10, 2024
CVE-2024-6512
6.5

This CVE describes an authorization bypass vulnerability in Devolutions Server's PAM access request approval mechanism. Authenticated users with appro...

Sep 25, 2024
CVE-2024-3404
6.5

This vulnerability allows authenticated attackers to bypass access controls and read other users' chat history files in the gaizhenbiao/chuanhuchatgpt...

Jun 6, 2024
CVE-2024-36376
6.5

This CVE describes an authorization bypass vulnerability in JetBrains TeamCity where users could perform actions beyond their assigned permissions. It...

May 29, 2024
CVE-2024-36364
6.5

This vulnerability in JetBrains TeamCity allows improper access control in Pull Requests and Commit status publisher build features. Attackers could p...

May 29, 2024
CVE-2024-3957
6.5

The Booster for WooCommerce plugin (also known as WooCommerce Jetpack) contains a vulnerability that allows unauthenticated attackers to execute arbit...

May 2, 2024
CVE-2025-62648
6.4

This vulnerability in the Restaurant Brands International (RBI) assistant platform allows remote attackers to manipulate Drive Thru speaker audio volu...

Oct 17, 2025
CVE-2025-21403
6.4

This vulnerability in On-Premises Data Gateway allows unauthorized access to sensitive information stored in gateway configurations. It affects organi...

Jan 14, 2025
CVE-2024-45037
6.4

A vulnerability in AWS Cloud Development Kit (CDK) versions 2.142.0 through 2.148.0 allows authenticated Amazon Cognito users to gain unintended acces...

Aug 27, 2024
CVE-2025-23262
6.3

NVIDIA ConnectX management interface has an authorization vulnerability where local attackers could gain unauthorized configuration access. This affec...

Sep 4, 2025
CVE-2024-9902
6.3

This vulnerability in Ansible's user module allows an unprivileged user to create or replace any file on the system and take ownership when a privileg...

Nov 6, 2024
CVE-2024-43954
6.3

This CVE describes an incorrect authorization vulnerability in the Themeum Droip WordPress plugin that allows users with lower privileges (like subscr...

Aug 29, 2024
CVE-2024-6358
6.3

CVE-2024-6358 is an incorrect authorization vulnerability in OpenText ArcSight Intelligence that allows authenticated users to access resources or per...

Aug 6, 2024
CVE-2024-48540
6.2

This vulnerability in XIAO HE Smart 4.3.1 allows attackers to bypass access controls and extract sensitive information by reverse-engineering the APK ...

Oct 24, 2024
CVE-2024-9098
6.1

This privilege escalation vulnerability allows administrators in lunary-ai/lunary to invite new users with billing permissions, bypassing intended acc...

Mar 20, 2025
CVE-2025-21570
6.1

This vulnerability in Oracle Life Sciences Argus Safety 8.2.3 allows unauthenticated attackers with network access to compromise the system via HTTP. ...

Jan 21, 2025
CVE-2024-42423
6.1

This vulnerability allows local unauthenticated users with low privileges to bypass authorization controls in Citrix Workspace App when Citrix CEB is ...

Sep 10, 2024
CVE-2025-66378
5.9

Pexip Infinity versions 38.0 and 38.1 have an insufficient access control vulnerability in their RTMP implementation. This allows attackers to disconn...

Dec 25, 2025
CVE-2025-54265
5.9

Adobe Commerce (Magento) versions 2.4.9-alpha2 through 2.4.4-p15 and earlier contain an incorrect authorization vulnerability (CWE-863) that allows at...

Oct 14, 2025
CVE-2024-49208
5.9

Archer Platform 2024.03 versions before 2024.08 have an authorization bypass vulnerability in supporting application files. This allows remote unprivi...

Oct 22, 2024
CVE-2026-21896
5.7

This vulnerability allows users with restricted permissions to bypass intended write restrictions in Kirby CMS. Attackers with authenticated access ca...

Jan 8, 2026
CVE-2025-9955
5.7

An improper access control vulnerability in WSO2 Enterprise Integrator allows low-privileged users to access internal SOAP admin services for system l...

Oct 16, 2025
CVE-2025-11060
5.7

This vulnerability in the SurrealDB database engine allows record or guest users to observe unauthorized records within the same table by exploiting c...

Sep 26, 2025
CVE-2024-2321
5.6

This vulnerability allows attackers to bypass authorization in WSO2 products by using refresh tokens instead of access tokens to access protected APIs...

Feb 27, 2025
CVE-2026-26949
5.5

Dell Device Management Agent (DDMA) versions before 26.02 contain an incorrect authorization vulnerability that allows local low-privileged attackers ...

Mar 4, 2026
CVE-2026-20624
5.5

This CVE describes an injection vulnerability in macOS that allows malicious applications to access sensitive user data. The issue affects macOS Sequo...

Feb 11, 2026
CVE-2025-43397
5.5

A permissions issue in macOS allows applications to cause denial-of-service conditions. This affects macOS Sequoia, Tahoe, and Sonoma systems before s...

Nov 4, 2025
CVE-2025-26442
5.5

This vulnerability in Android's Settings app allows local information disclosure without requiring user interaction or elevated privileges. It affects...

Sep 4, 2025
CVE-2025-30739
5.5

This vulnerability in Oracle CRM Technical Foundation allows high-privileged attackers with network access via HTTP to perform unauthorized data manip...

Jul 15, 2025
CVE-2024-8270
5.5

The macOS Rocket.Chat application has a TCC bypass vulnerability that allows attackers to inject malicious DYLIB files, circumventing macOS security p...

Jun 11, 2025
CVE-2025-24114
5.5

This CVE describes a macOS permissions vulnerability that allows applications to modify protected areas of the file system. It affects macOS Ventura, ...

Jan 27, 2025
CVE-2025-21533
5.5

This vulnerability in Oracle VM VirtualBox allows a low-privileged attacker with local access to the host system to access sensitive data from Virtual...

Jan 21, 2025
CVE-2024-47102
5.5

A local privilege escalation vulnerability in IBM AIX's perfstat kernel extension allows non-privileged local users to cause a denial of service. This...

Dec 25, 2024
CVE-2024-44301
5.5

This vulnerability allows a malicious application to bypass macOS file system protections and modify restricted areas. It affects macOS Ventura and So...

Oct 28, 2024
CVE-2024-44247
5.5

This CVE describes a macOS vulnerability where a malicious application could bypass file system protections and modify restricted areas. It affects ma...

Oct 28, 2024
CVE-2024-40855
5.5

This CVE describes a macOS sandbox escape vulnerability where a sandboxed application can bypass security restrictions to access sensitive user data. ...

Oct 28, 2024
CVE-2024-39322
5.5

This CVE describes an improper access control vulnerability in Aimeos e-commerce JSON API for administrative tasks. It allows users with editor permis...

Jul 2, 2024
CVE-2023-38368
5.5

IBM Security Access Manager Docker versions 10.0.0.0 through 10.0.7.1 have improper permission controls that could allow local users to access sensiti...

Jun 27, 2024
CVE-2024-36037
5.5

This vulnerability in Zoho ManageEngine ADAudit Plus allows unauthorized local users on agent machines to view session recordings. It affects organiza...

May 27, 2024
CVE-2026-25566
5.4

This CVE describes an authorization vulnerability in WeKan's card movement functionality. Users can move cards to boards, lists, or swimlanes without ...

Feb 7, 2026
CVE-2025-67856
5.4

An authorization logic flaw in Moodle's badge awarding system allows users to obtain badges without proper role verification. This affects all Moodle ...

Feb 3, 2026
CVE-2025-69289
5.4

A privilege escalation vulnerability in Discourse allows non-admin moderators to bypass email-change restrictions, potentially enabling account takeov...

Jan 28, 2026
CVE-2025-68660
5.4

This vulnerability in Discourse allows authenticated users to bypass AI persona access controls, gaining unauthorized access to staff-only AI personas...

Jan 28, 2026
CVE-2025-67490
5.4

The Auth0 Next.js SDK vulnerability allows simultaneous requests from the same client to cause improper token cache lookups, potentially leading to au...

Dec 10, 2025
CVE-2025-20381
5.4

This vulnerability allows authenticated users of Splunk MCP Server app to bypass SPL command restrictions by embedding commands as sub-searches. Attac...

Dec 3, 2025
CVE-2025-64707
5.4

CVE-2025-64707 is an access control vulnerability in Frappe Learning where role revocation isn't immediately effective due to caching issues. This all...

Nov 12, 2025
CVE-2025-62259
5.4

This vulnerability allows remote users to access and edit content via APIs in Liferay Portal and DXP before email verification, bypassing intended acc...

Oct 27, 2025
CVE-2025-7374
5.4

The WP JobHunt plugin for WordPress (used by JobCareer theme) has an authorization bypass vulnerability that allows authenticated attackers with Candi...

Oct 10, 2025
CVE-2025-31254
5.4

This Safari/iOS/iPadOS vulnerability allows malicious web content to trigger unexpected URL redirections due to improper URL validation. It affects us...

Sep 15, 2025
CVE-2025-55177
KEV 5.4

This WhatsApp vulnerability allows unauthorized users to trigger processing of arbitrary URLs on a target's device through linked device synchronizati...

Aug 29, 2025

About Incorrect Authorization (CWE-863)

The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.

Our database tracks 711 CVEs classified as CWE-863, with 139 rated critical and 315 rated high severity. The average CVSS score for Incorrect Authorization vulnerabilities is 7.3.

External reference: View CWE-863 on MITRE CWE →

Monitor Incorrect Authorization Vulnerabilities

Get alerted when new Incorrect Authorization CVEs affect your infrastructure.

Start Monitoring Free