CWE-863: Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.
Yearly Trend
Top Affected Vendors
All Incorrect Authorization CVEs (711)
This vulnerability in mod_proxy_cluster allows unauthorized access to MCMP (Mod-Cluster Management Protocol) endpoints due to incorrect use of the <Di...
Apr 23, 2025Mattermost fails to enforce channel conversion restrictions, allowing users with permission to convert public channels to private to also convert priv...
Mar 21, 2025This vulnerability in Directus allows users with overlapping update permissions to modify fields they shouldn't have access to. When multiple policies...
Feb 19, 2025This vulnerability in Oracle Primavera P6 Enterprise Project Portfolio Management allows authenticated attackers with low privileges to perform unauth...
Jan 21, 2025This vulnerability in Oracle PeopleSoft Enterprise FIN eSettlements 9.2 allows authenticated attackers with low privileges to modify or delete some da...
Jan 21, 2025This vulnerability in Oracle PeopleSoft Enterprise FIN Cash Management allows authenticated attackers with low privileges to modify or delete some dat...
Jan 21, 2025This vulnerability in Mozilla's WebChannel API allows privilege escalation by accepting arbitrary principal information from untrusted sources. Attack...
Jan 7, 2025This vulnerability allows unauthorized users to access functionality intended only for administrators in the WPChill Htaccess File Editor WordPress pl...
Nov 1, 2024This CVE describes an incorrect authorization vulnerability in the Greenshift WordPress plugin that allows attackers to bypass access controls. It aff...
Oct 30, 2024This CVE describes an indirect object reference (IDOR) vulnerability in Chef Habitat builder-api that allows unauthorized deletion of personal tokens....
Oct 28, 2024This CVE describes an Improper Authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security measures. The vul...
Oct 10, 2024This vulnerability allows unauthenticated attackers to bypass category restrictions in the User Submitted Posts WordPress plugin. Attackers can assign...
Feb 18, 2026The Ajax Load More WordPress plugin has an authorization vulnerability that allows unauthenticated attackers to view titles and excerpts of private, d...
Jan 31, 2026This CVE describes an incorrect authorization vulnerability in Drupal's Entity Share module that allows forceful browsing (unauthorized access to rest...
Jan 28, 2026This CVE describes a logic error in Mastodon's user suspension feature that allows posts from suspended remote users to appear in timelines. All Masto...
Jan 22, 2026The Float Payment Gateway WordPress plugin has an improper error handling vulnerability that allows unauthenticated attackers to mark any WooCommerce ...
Jan 14, 2026The Templately WordPress plugin has an arbitrary file write vulnerability that allows unauthenticated attackers to create .ai.json files in the upload...
Jan 10, 2026The Awesome Hotel Booking WordPress plugin has an authorization bypass vulnerability that allows unauthenticated attackers to modify booking records. ...
Jan 7, 2026CVE-2025-9056 is an unprotected service vulnerability in the AudioLink component that allows local attackers to overwrite system files through unautho...
Dec 10, 2025This vulnerability in grist-core allows users with partial read access to documents to view sensitive document history and changes they shouldn't have...
Nov 13, 2025This vulnerability in the Flexible Refund and Return Order for WooCommerce WordPress plugin allows authenticated attackers with Contributor-level acce...
Nov 8, 2025This vulnerability allows remote attackers to view images in blog entries without proper permission checks in Liferay Portal and DXP. Attackers can ac...
Nov 1, 2025This vulnerability in Liferay Portal/DXP allows JSON Web Services to be invoked directly as classes, bypassing intended Service Access Policy controls...
Sep 12, 2025This vulnerability in Tera Insights tiCrypt's tiaudit component allows unauthenticated attackers to make REST API requests that expose sensitive infor...
Aug 4, 2025This CVE describes a permission precedence vulnerability in Deno where 'deny' flags don't properly override 'allow' flags when both are specified for ...
Jun 4, 2025The Reales WP STPT WordPress plugin allows unauthenticated attackers to create user accounts without permission checks. This affects all WordPress sit...
May 6, 2025This vulnerability in the Password Protected WordPress plugin allows unauthenticated attackers to extract all protected site content when the 'Use Tra...
Apr 17, 2025An unauthenticated attacker can exploit this vulnerability via HTTP to read sensitive data from Oracle Communications Order and Service Management. Th...
Jan 21, 2025An access control vulnerability in D-Link DIR-816 routers allows unauthenticated attackers to modify the agl service configuration via crafted POST re...
Jan 16, 2025This CVE describes an incorrect authorization vulnerability in Drupal's Pages Restriction Access module that allows attackers to bypass access control...
Jan 9, 2025This CVE describes an incorrect authorization vulnerability in Drupal's Responsive and off-canvas menu module that allows forceful browsing (accessing...
Jan 9, 2025This CVE describes an incorrect authorization vulnerability in Drupal Commerce View Receipt that allows forceful browsing. Attackers can bypass intend...
Jan 9, 2025This vulnerability allows non-member users to view internal notes in public GitLab merge requests. It affects GitLab CE/EE instances where public proj...
Dec 16, 2024A suspended GitHub App could retain unauthorized access to public repositories via scoped user access tokens in GitHub Enterprise Server. This incorre...
Jul 16, 2024This CVE describes an incorrect authorization vulnerability in Adobe Commerce that allows attackers to bypass security features and perform unauthoriz...
Jun 13, 2024This macOS privilege escalation vulnerability allows local attackers to gain elevated system privileges. It affects macOS Ventura, Sonoma, and Sequoia...
Jan 30, 2025This vulnerability allows a non-server device token to retrieve other users' access tokens via the clients.plex.tv/devices.xml endpoint. This affects ...
Jan 2, 2026This vulnerability allows a non-server device token to retrieve share tokens intended for unrelated access via the shared_servers endpoint in Plex Med...
Jan 2, 2026Step CA versions before 0.29.0 have an improper authorization check for SSH certificate revocation when using SSHPOP provisioner. This allows unauthor...
Dec 3, 2025The Restaurant Brands International assistant platform allows attackers to obtain a JWT token that can generate signed AWS upload URLs for any store's...
Oct 17, 2025Gitea versions before 1.22.3 contain an authorization bypass vulnerability where API tokens with scope limited to public resources can improperly acce...
Dec 26, 2025This vulnerability allows authenticated group manager users in Galette to bypass intended restrictions on Contributions and Transactions functionality...
Dec 19, 2025The YoSmart YoLink MQTT broker has insufficient authorization controls that allow cross-account attacks. Attackers can remotely operate any YoLink use...
Oct 6, 2025A vulnerability in MySQL Server's optimizer component allows high-privileged attackers with network access to cause denial of service by crashing or h...
Jul 15, 2025This vulnerability in Oracle MySQL Server's Components Services allows high-privileged attackers with network access to cause denial of service by cra...
Jul 15, 2025This vulnerability allows deploy keys to push code to archived GitLab repositories, bypassing intended access controls. It affects GitLab Community Ed...
Oct 10, 2024This vulnerability allows remote authenticated administrators to bypass firmware integrity checks on Synology BC500 and TC500 cameras. Attackers could...
Jun 28, 2024This CVE describes an incorrect authorization vulnerability in Drupal Canvas that allows forceful browsing (unauthorized access to restricted function...
Feb 4, 2026This vulnerability allows delegated granular administration users with 'Edit Other Users' permission to modify system administrator accounts in Matter...
Apr 14, 2025OvalEdge versions 5.2.8.0 and earlier contain a privilege escalation vulnerability where authenticated users with OE_ADMIN role privileges can assign ...
Oct 25, 2024About Incorrect Authorization (CWE-863)
The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.
Our database tracks 711 CVEs classified as CWE-863, with 139 rated critical and 315 rated high severity. The average CVSS score for Incorrect Authorization vulnerabilities is 7.3.
External reference: View CWE-863 on MITRE CWE →
Monitor Incorrect Authorization Vulnerabilities
Get alerted when new Incorrect Authorization CVEs affect your infrastructure.
Start Monitoring Free