CWE-863: Incorrect Authorization

The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.

711
Total CVEs
139
Critical
315
High
7.3
Avg CVSS
3
In CISA KEV

Yearly Trend

2026
77
2025
260
2024
164
2023
97
2022
35

Top Affected Vendors

1 Oracle 34
2 Apple 26
3 Adobe 23
4 Google 19
5 Mattermost 18
6 Gitlab 16
7 Ibm 13
8 Apache 10
9 Wso2 7
10 Lunary 7

All Incorrect Authorization CVEs (711)

CVE-2024-10306
5.4

This vulnerability in mod_proxy_cluster allows unauthorized access to MCMP (Mod-Cluster Management Protocol) endpoints due to incorrect use of the <Di...

Apr 23, 2025
CVE-2025-27933
5.4

Mattermost fails to enforce channel conversion restrictions, allowing users with permission to convert public channels to private to also convert priv...

Mar 21, 2025
CVE-2025-27089
5.4

This vulnerability in Directus allows users with overlapping update permissions to modify fields they shouldn't have access to. When multiple policies...

Feb 19, 2025
CVE-2025-21558
5.4

This vulnerability in Oracle Primavera P6 Enterprise Project Portfolio Management allows authenticated attackers with low privileges to perform unauth...

Jan 21, 2025
CVE-2025-21539
5.4

This vulnerability in Oracle PeopleSoft Enterprise FIN eSettlements 9.2 allows authenticated attackers with low privileges to modify or delete some da...

Jan 21, 2025
CVE-2025-21537
5.4

This vulnerability in Oracle PeopleSoft Enterprise FIN Cash Management allows authenticated attackers with low privileges to modify or delete some dat...

Jan 21, 2025
CVE-2025-0237
5.4

This vulnerability in Mozilla's WebChannel API allows privilege escalation by accepting arbitrary principal information from untrusted sources. Attack...

Jan 7, 2025
CVE-2024-49256
5.4

This vulnerability allows unauthorized users to access functionality intended only for administrators in the WPChill Htaccess File Editor WordPress pl...

Nov 1, 2024
CVE-2024-50419
5.4

This CVE describes an incorrect authorization vulnerability in the Greenshift WordPress plugin that allows attackers to bypass access controls. It aff...

Oct 30, 2024
CVE-2024-9825
5.4

This CVE describes an indirect object reference (IDOR) vulnerability in Chef Habitat builder-api that allows unauthorized deletion of personal tokens....

Oct 28, 2024
CVE-2024-45128
5.4

This CVE describes an Improper Authorization vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security measures. The vul...

Oct 10, 2024
CVE-2026-2126
5.3

This vulnerability allows unauthenticated attackers to bypass category restrictions in the User Submitted Posts WordPress plugin. Attackers can assign...

Feb 18, 2026
CVE-2025-15525
5.3

The Ajax Load More WordPress plugin has an authorization vulnerability that allows unauthenticated attackers to view titles and excerpts of private, d...

Jan 31, 2026
CVE-2025-13985
5.3

This CVE describes an incorrect authorization vulnerability in Drupal's Entity Share module that allows forceful browsing (unauthorized access to rest...

Jan 28, 2026
CVE-2026-23961
5.3

This CVE describes a logic error in Mastodon's user suspension feature that allows posts from suspended remote users to appear in timelines. All Masto...

Jan 22, 2026
CVE-2025-15513
5.3

The Float Payment Gateway WordPress plugin has an improper error handling vulnerability that allows unauthenticated attackers to mark any WooCommerce ...

Jan 14, 2026
CVE-2026-0831
5.3

The Templately WordPress plugin has an arbitrary file write vulnerability that allows unauthenticated attackers to create .ai.json files in the upload...

Jan 10, 2026
CVE-2025-14352
5.3

The Awesome Hotel Booking WordPress plugin has an authorization bypass vulnerability that allows unauthenticated attackers to modify booking records. ...

Jan 7, 2026
CVE-2025-9056
5.3

CVE-2025-9056 is an unprotected service vulnerability in the AudioLink component that allows local attackers to overwrite system files through unautho...

Dec 10, 2025
CVE-2025-64753
5.3

This vulnerability in grist-core allows users with partial read access to documents to view sensitive document history and changes they shouldn't have...

Nov 13, 2025
CVE-2025-12621
5.3

This vulnerability in the Flexible Refund and Return Order for WooCommerce WordPress plugin allows authenticated attackers with Contributor-level acce...

Nov 8, 2025
CVE-2025-62275
5.3

This vulnerability allows remote attackers to view images in blog entries without proper permission checks in Liferay Portal and DXP. Attackers can ac...

Nov 1, 2025
CVE-2025-43789
5.3

This vulnerability in Liferay Portal/DXP allows JSON Web Services to be invoked directly as classes, bypassing intended Service Access Policy controls...

Sep 12, 2025
CVE-2025-54554
5.3

This vulnerability in Tera Insights tiCrypt's tiaudit component allows unauthenticated attackers to make REST API requests that expose sensitive infor...

Aug 4, 2025
CVE-2025-48888
5.3

This CVE describes a permission precedence vulnerability in Deno where 'deny' flags don't properly override 'allow' flags when both are specified for ...

Jun 4, 2025
CVE-2025-3609
5.3

The Reales WP STPT WordPress plugin allows unauthenticated attackers to create user accounts without permission checks. This affects all WordPress sit...

May 6, 2025
CVE-2025-3453
5.3

This vulnerability in the Password Protected WordPress plugin allows unauthenticated attackers to extract all protected site content when the 'Use Tra...

Apr 17, 2025
CVE-2025-21554
5.3

An unauthenticated attacker can exploit this vulnerability via HTTP to read sensitive data from Oracle Communications Order and Service Management. Th...

Jan 21, 2025
CVE-2024-57681
5.3

An access control vulnerability in D-Link DIR-816 routers allows unauthenticated attackers to modify the agl service configuration via crafted POST re...

Jan 16, 2025
CVE-2024-13302
5.3

This CVE describes an incorrect authorization vulnerability in Drupal's Pages Restriction Access module that allows attackers to bypass access control...

Jan 9, 2025
CVE-2024-13266
5.3

This CVE describes an incorrect authorization vulnerability in Drupal's Responsive and off-canvas menu module that allows forceful browsing (accessing...

Jan 9, 2025
CVE-2024-13257
5.3

This CVE describes an incorrect authorization vulnerability in Drupal Commerce View Receipt that allows forceful browsing. Attackers can bypass intend...

Jan 9, 2025
CVE-2024-8650
5.3

This vulnerability allows non-member users to view internal notes in public GitLab merge requests. It affects GitLab CE/EE instances where public proj...

Dec 16, 2024
CVE-2024-5816
5.3

A suspended GitHub App could retain unauthorized access to public repositories via scoped user access tokens in GitHub Enterprise Server. This incorre...

Jul 16, 2024
CVE-2024-34106
5.3

This CVE describes an incorrect authorization vulnerability in Adobe Commerce that allows attackers to bypass security features and perform unauthoriz...

Jun 13, 2024
CVE-2025-24099
5.1

This macOS privilege escalation vulnerability allows local attackers to gain elevated system privileges. It affects macOS Ventura, Sonoma, and Sequoia...

Jan 30, 2025
CVE-2025-69416
5.0

This vulnerability allows a non-server device token to retrieve other users' access tokens via the clients.plex.tv/devices.xml endpoint. This affects ...

Jan 2, 2026
CVE-2025-69417
5.0

This vulnerability allows a non-server device token to retrieve share tokens intended for unrelated access via the shared_servers endpoint in Plex Med...

Jan 2, 2026
CVE-2025-66406
5.0

Step CA versions before 0.29.0 have an improper authorization check for SSH certificate revocation when using SSHPOP provisioner. This allows unauthor...

Dec 3, 2025
CVE-2025-62647
5.0

The Restaurant Brands International assistant platform allows attackers to obtain a JWT token that can generate signed AWS upload URLs for any store's...

Oct 17, 2025
CVE-2025-68941
4.9

Gitea versions before 1.22.3 contain an authorization bypass vulnerability where API tokens with scope limited to public resources can improperly acce...

Dec 26, 2025
CVE-2025-53922
4.9

This vulnerability allows authenticated group manager users in Galette to bypass intended restrictions on Contributions and Transactions functionality...

Dec 19, 2025
CVE-2025-59449
4.9

The YoSmart YoLink MQTT broker has insufficient authorization controls that allow cross-account attacks. Attackers can remotely operate any YoLink use...

Oct 6, 2025
CVE-2025-50084
4.9

A vulnerability in MySQL Server's optimizer component allows high-privileged attackers with network access to cause denial of service by crashing or h...

Jul 15, 2025
CVE-2025-50086
4.9

This vulnerability in Oracle MySQL Server's Components Services allows high-privileged attackers with network access to cause denial of service by cra...

Jul 15, 2025
CVE-2024-9623
4.9

This vulnerability allows deploy keys to push code to archived GitLab repositories, bypassing intended access controls. It affects GitLab Community Ed...

Oct 10, 2024
CVE-2024-39352
4.9

This vulnerability allows remote authenticated administrators to bypass firmware integrity checks on Synology BC500 and TC500 cameras. Attackers could...

Jun 28, 2024
CVE-2026-1553
4.8

This CVE describes an incorrect authorization vulnerability in Drupal Canvas that allows forceful browsing (unauthorized access to restricted function...

Feb 4, 2026
CVE-2025-32093
4.7

This vulnerability allows delegated granular administration users with 'Edit Other Users' permission to modify system administrator accounts in Matter...

Apr 14, 2025
CVE-2022-30356
4.7

OvalEdge versions 5.2.8.0 and earlier contain a privilege escalation vulnerability where authenticated users with OE_ADMIN role privileges can assign ...

Oct 25, 2024

About Incorrect Authorization (CWE-863)

The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.

Our database tracks 711 CVEs classified as CWE-863, with 139 rated critical and 315 rated high severity. The average CVSS score for Incorrect Authorization vulnerabilities is 7.3.

External reference: View CWE-863 on MITRE CWE →

Monitor Incorrect Authorization Vulnerabilities

Get alerted when new Incorrect Authorization CVEs affect your infrastructure.

Start Monitoring Free