CWE-863: Incorrect Authorization

The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.

712
Total CVEs
140
Critical
315
High
7.3
Avg CVSS
3
In CISA KEV

Yearly Trend

2026
77
2025
260
2024
164
2023
97
2022
35

Top Affected Vendors

1 Oracle 34
2 Apple 26
3 Adobe 23
4 Google 19
5 Mattermost 18
6 Gitlab 16
7 Ibm 13
8 Apache 10
9 Wso2 7
10 Lunary 7

All Incorrect Authorization CVEs (712)

CVE-2022-30356
4.7

OvalEdge versions 5.2.8.0 and earlier contain a privilege escalation vulnerability where authenticated users with OE_ADMIN role privileges can assign ...

Oct 25, 2024
CVE-2025-31227
4.6

This vulnerability allows attackers with physical access to an iOS/iPadOS device to recover deleted call recordings. The issue stems from improper acc...

May 12, 2025
CVE-2025-31673
4.6

This CVE describes an incorrect authorization vulnerability in Drupal core that allows forceful browsing (accessing restricted pages without proper pe...

Mar 31, 2025
CVE-2024-12247
4.6

Mattermost fails to properly propagate permission scheme updates across cluster nodes, allowing users to retain old permissions even after administrat...

Dec 5, 2024
CVE-2025-54569
4.5

This vulnerability allows a local attacker to escalate privileges on Windows systems running vulnerable versions of Malwarebytes Binisoft Windows Fire...

Jul 28, 2025
CVE-2025-21568
4.5

This vulnerability in Oracle Hyperion Data Relationship Management allows high-privileged attackers with network access to gain unauthorized access to...

Jan 21, 2025
CVE-2025-43336
4.4

A macOS permissions vulnerability allows applications with root privileges to access private information they shouldn't normally access. This affects ...

Nov 4, 2025
CVE-2025-21519
4.4

This vulnerability in Oracle MySQL Server's privilege management component allows high-privileged attackers with network access to cause denial of ser...

Jan 21, 2025
CVE-2026-28724
4.3

This vulnerability allows unauthorized data access in Acronis Cyber Protect 17 due to insufficient access control validation. Attackers could potentia...

Mar 6, 2026
CVE-2026-28726
4.3

This vulnerability allows unauthorized access to sensitive information in Acronis Cyber Protect 17 due to improper access control mechanisms. It affec...

Mar 6, 2026
CVE-2026-28719
4.3

This vulnerability allows unauthorized users to manipulate resources in Acronis Cyber Protect 17 due to improper authorization checks. It affects Acro...

Mar 6, 2026
CVE-2026-2386
4.3

This vulnerability allows authenticated WordPress users with Author-level permissions or higher to create draft posts for restricted post types they s...

Feb 18, 2026
CVE-2026-0997
4.3

This vulnerability allows any authenticated Mattermost user to modify Zoom meeting restrictions for any channel via API requests. Affected systems inc...

Feb 16, 2026
CVE-2026-22892
4.3

This vulnerability allows authenticated Mattermost users with Jira plugin access to bypass channel permissions and read posts/attachments from channel...

Feb 13, 2026
CVE-2025-15342
4.3

An improper access controls vulnerability in Tanium Reputation allows authenticated users to access data they shouldn't have permission to view. This ...

Feb 5, 2026
CVE-2025-15395
4.3

This CVE describes an access control vulnerability in IBM Jazz Foundation that allows authenticated users to perform actions or view data beyond their...

Feb 2, 2026
CVE-2026-22624
4.3

This vulnerability allows authenticated users of certain HIKSEMI NAS products to access and manipulate other users' files without proper authorization...

Jan 30, 2026
CVE-2025-15322
4.3

An improper access controls vulnerability in Tanium Server allows authenticated users to access resources they shouldn't have permission to view. This...

Jan 30, 2026
CVE-2025-68140
4.3

This vulnerability allows attackers to bypass session validation in EVerest EV charging software by sending V2G messages with session ID 0 when no ses...

Jan 21, 2026
CVE-2026-0684
4.3

The CP Image Store with Slideshow WordPress plugin has an authorization bypass vulnerability that allows authenticated users with Contributor-level ac...

Jan 13, 2026
CVE-2025-14943
4.3

This vulnerability in the Blog2Social WordPress plugin allows authenticated users with Subscriber-level access or higher to bypass authorization check...

Jan 10, 2026
CVE-2025-13753
4.3

The WP Table Builder WordPress plugin has an authorization flaw that allows authenticated users with Subscriber-level access or higher to create unaut...

Jan 9, 2026
CVE-2025-68938
4.3

Gitea versions before 1.25.2 have an authorization flaw that allows users to delete releases they shouldn't have permission to delete. This affects al...

Dec 26, 2025
CVE-2025-13767
4.3

This vulnerability allows authenticated Mattermost users with Jira plugin access to read posts and attachments from channels they shouldn't have acces...

Dec 24, 2025
CVE-2025-68386
4.3

This vulnerability allows authenticated Kibana users to escalate privileges by changing document sharing settings to 'global', making documents visibl...

Dec 18, 2025
CVE-2025-68422
4.3

CVE-2025-68422 is an improper authorization vulnerability in Kibana that allows authenticated users to bypass permission restrictions via crafted HTTP...

Dec 18, 2025
CVE-2025-14318
4.3

M-Files Server versions before 25.12.15491.7 have an improper access control vulnerability that allows authenticated users to download files through M...

Dec 18, 2025
CVE-2025-14081
4.3

The Ultimate Member WordPress plugin has a profile privacy setting bypass vulnerability that allows authenticated attackers with Subscriber-level acce...

Dec 17, 2025
CVE-2025-40819
4.3

This vulnerability in SINEMA Remote Connect Server allows attackers with database access to directly modify the system_ticketinfo table and bypass lic...

Dec 9, 2025
CVE-2025-12756
4.3

This vulnerability allows authenticated users with editor permissions in Mattermost Boards to delete comments created by other users, bypassing intend...

Dec 1, 2025
CVE-2025-12971
4.3

This vulnerability in the WordPress Folders plugin allows authenticated attackers with Contributor-level access or higher to move arbitrary folder con...

Nov 27, 2025
CVE-2025-13432
4.3

In Terraform Enterprise, users with specific but insufficient permissions can create state versions in workspaces, potentially allowing infrastructure...

Nov 21, 2025
CVE-2025-62189
4.3

LogStare Collector has an incorrect authorization vulnerability in UserRegistration that allows non-administrative users to create new accounts via cr...

Nov 21, 2025
CVE-2025-11865
4.3

This vulnerability in GitLab EE allows an attacker to remove Duo two-factor authentication flows of another user under certain circumstances. It affec...

Nov 15, 2025
CVE-2025-11776
4.3

Mattermost versions before 11 have an authorization bypass vulnerability where guest users can discover archived public channels through a specific AP...

Nov 14, 2025
CVE-2025-62394
4.3

Moodle fails to properly verify user enrolment status when sending quiz notifications, allowing suspended or inactive users to receive quiz-related me...

Oct 23, 2025
CVE-2025-42939
4.3

CVE-2025-42939 is an authorization bypass vulnerability in SAP S/4HANA's Manage Processing Rules for Bank Statements module. Authenticated attackers w...

Oct 14, 2025
CVE-2025-49641
4.3

This CVE describes an authorization bypass vulnerability in Zabbix where regular users without proper permissions can still access the problem viewing...

Oct 3, 2025
CVE-2025-11239
4.3

This vulnerability in KNIME Business Hub allows unauthorized team members to view sensitive information within jobs, potentially exposing confidential...

Oct 2, 2025
CVE-2025-43806
4.3

This vulnerability allows remote authenticated users to bypass permission checks in Liferay's Batch Engine, enabling unauthorized access to exported d...

Sep 22, 2025
CVE-2025-58134
4.3

This CVE describes an incorrect authorization vulnerability in Zoom Workplace Clients for Windows that allows authenticated users to potentially modif...

Sep 9, 2025
CVE-2025-1501
4.3

An authenticated user with limited privileges can request and download trace files due to improper access restrictions in CMC before version 25.1.0. T...

Aug 26, 2025
CVE-2025-9228
4.3

MiR software versions before 3.0.0 have an authorization flaw that allows low-privilege users to create administrative text notes. This affects organi...

Aug 20, 2025
CVE-2025-20332
4.3

This vulnerability in Cisco ISE allows authenticated attackers with read-only administrator credentials to modify configuration descriptions through c...

Aug 6, 2025
CVE-2025-8068
4.3

This vulnerability in the HT Mega WordPress plugin allows authenticated users with Contributor-level access or higher to delete arbitrary files and mo...

Jul 31, 2025
CVE-2025-53902
4.3

This CVE describes an authorization bypass vulnerability in Tuleap where authenticated users can access confidential artifact information they shouldn...

Jul 29, 2025
CVE-2025-54532
4.3

This vulnerability in JetBrains TeamCity allows unauthorized users to access sensitive build configuration settings through snapshot dependencies. It ...

Jul 28, 2025
CVE-2025-6981
4.3

An incorrect authorization vulnerability in GitHub Enterprise Server allowed contractor accounts to read internal repository contents when the Contrac...

Jul 15, 2025
CVE-2025-30747
4.3

This vulnerability in Oracle PeopleSoft Enterprise PeopleTools allows unauthenticated attackers to read sensitive data by tricking users into clicking...

Jul 15, 2025
CVE-2025-20300
4.3

In affected Splunk Enterprise and Cloud Platform versions, a low-privileged user with read-only access to a specific alert can suppress that alert whe...

Jul 7, 2025

About Incorrect Authorization (CWE-863)

The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.

Our database tracks 712 CVEs classified as CWE-863, with 140 rated critical and 315 rated high severity. The average CVSS score for Incorrect Authorization vulnerabilities is 7.3.

External reference: View CWE-863 on MITRE CWE →

Monitor Incorrect Authorization Vulnerabilities

Get alerted when new Incorrect Authorization CVEs affect your infrastructure.

Start Monitoring Free