CWE-863: Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.
Yearly Trend
Top Affected Vendors
All Incorrect Authorization CVEs (712)
OvalEdge versions 5.2.8.0 and earlier contain a privilege escalation vulnerability where authenticated users with OE_ADMIN role privileges can assign ...
Oct 25, 2024This vulnerability allows attackers with physical access to an iOS/iPadOS device to recover deleted call recordings. The issue stems from improper acc...
May 12, 2025This CVE describes an incorrect authorization vulnerability in Drupal core that allows forceful browsing (accessing restricted pages without proper pe...
Mar 31, 2025Mattermost fails to properly propagate permission scheme updates across cluster nodes, allowing users to retain old permissions even after administrat...
Dec 5, 2024This vulnerability allows a local attacker to escalate privileges on Windows systems running vulnerable versions of Malwarebytes Binisoft Windows Fire...
Jul 28, 2025This vulnerability in Oracle Hyperion Data Relationship Management allows high-privileged attackers with network access to gain unauthorized access to...
Jan 21, 2025A macOS permissions vulnerability allows applications with root privileges to access private information they shouldn't normally access. This affects ...
Nov 4, 2025This vulnerability in Oracle MySQL Server's privilege management component allows high-privileged attackers with network access to cause denial of ser...
Jan 21, 2025This vulnerability allows unauthorized data access in Acronis Cyber Protect 17 due to insufficient access control validation. Attackers could potentia...
Mar 6, 2026This vulnerability allows unauthorized access to sensitive information in Acronis Cyber Protect 17 due to improper access control mechanisms. It affec...
Mar 6, 2026This vulnerability allows unauthorized users to manipulate resources in Acronis Cyber Protect 17 due to improper authorization checks. It affects Acro...
Mar 6, 2026This vulnerability allows authenticated WordPress users with Author-level permissions or higher to create draft posts for restricted post types they s...
Feb 18, 2026This vulnerability allows any authenticated Mattermost user to modify Zoom meeting restrictions for any channel via API requests. Affected systems inc...
Feb 16, 2026This vulnerability allows authenticated Mattermost users with Jira plugin access to bypass channel permissions and read posts/attachments from channel...
Feb 13, 2026An improper access controls vulnerability in Tanium Reputation allows authenticated users to access data they shouldn't have permission to view. This ...
Feb 5, 2026This CVE describes an access control vulnerability in IBM Jazz Foundation that allows authenticated users to perform actions or view data beyond their...
Feb 2, 2026This vulnerability allows authenticated users of certain HIKSEMI NAS products to access and manipulate other users' files without proper authorization...
Jan 30, 2026An improper access controls vulnerability in Tanium Server allows authenticated users to access resources they shouldn't have permission to view. This...
Jan 30, 2026This vulnerability allows attackers to bypass session validation in EVerest EV charging software by sending V2G messages with session ID 0 when no ses...
Jan 21, 2026The CP Image Store with Slideshow WordPress plugin has an authorization bypass vulnerability that allows authenticated users with Contributor-level ac...
Jan 13, 2026This vulnerability in the Blog2Social WordPress plugin allows authenticated users with Subscriber-level access or higher to bypass authorization check...
Jan 10, 2026The WP Table Builder WordPress plugin has an authorization flaw that allows authenticated users with Subscriber-level access or higher to create unaut...
Jan 9, 2026Gitea versions before 1.25.2 have an authorization flaw that allows users to delete releases they shouldn't have permission to delete. This affects al...
Dec 26, 2025This vulnerability allows authenticated Mattermost users with Jira plugin access to read posts and attachments from channels they shouldn't have acces...
Dec 24, 2025This vulnerability allows authenticated Kibana users to escalate privileges by changing document sharing settings to 'global', making documents visibl...
Dec 18, 2025CVE-2025-68422 is an improper authorization vulnerability in Kibana that allows authenticated users to bypass permission restrictions via crafted HTTP...
Dec 18, 2025M-Files Server versions before 25.12.15491.7 have an improper access control vulnerability that allows authenticated users to download files through M...
Dec 18, 2025The Ultimate Member WordPress plugin has a profile privacy setting bypass vulnerability that allows authenticated attackers with Subscriber-level acce...
Dec 17, 2025This vulnerability in SINEMA Remote Connect Server allows attackers with database access to directly modify the system_ticketinfo table and bypass lic...
Dec 9, 2025This vulnerability allows authenticated users with editor permissions in Mattermost Boards to delete comments created by other users, bypassing intend...
Dec 1, 2025This vulnerability in the WordPress Folders plugin allows authenticated attackers with Contributor-level access or higher to move arbitrary folder con...
Nov 27, 2025In Terraform Enterprise, users with specific but insufficient permissions can create state versions in workspaces, potentially allowing infrastructure...
Nov 21, 2025LogStare Collector has an incorrect authorization vulnerability in UserRegistration that allows non-administrative users to create new accounts via cr...
Nov 21, 2025This vulnerability in GitLab EE allows an attacker to remove Duo two-factor authentication flows of another user under certain circumstances. It affec...
Nov 15, 2025Mattermost versions before 11 have an authorization bypass vulnerability where guest users can discover archived public channels through a specific AP...
Nov 14, 2025Moodle fails to properly verify user enrolment status when sending quiz notifications, allowing suspended or inactive users to receive quiz-related me...
Oct 23, 2025CVE-2025-42939 is an authorization bypass vulnerability in SAP S/4HANA's Manage Processing Rules for Bank Statements module. Authenticated attackers w...
Oct 14, 2025This CVE describes an authorization bypass vulnerability in Zabbix where regular users without proper permissions can still access the problem viewing...
Oct 3, 2025This vulnerability in KNIME Business Hub allows unauthorized team members to view sensitive information within jobs, potentially exposing confidential...
Oct 2, 2025This vulnerability allows remote authenticated users to bypass permission checks in Liferay's Batch Engine, enabling unauthorized access to exported d...
Sep 22, 2025This CVE describes an incorrect authorization vulnerability in Zoom Workplace Clients for Windows that allows authenticated users to potentially modif...
Sep 9, 2025An authenticated user with limited privileges can request and download trace files due to improper access restrictions in CMC before version 25.1.0. T...
Aug 26, 2025MiR software versions before 3.0.0 have an authorization flaw that allows low-privilege users to create administrative text notes. This affects organi...
Aug 20, 2025This vulnerability in Cisco ISE allows authenticated attackers with read-only administrator credentials to modify configuration descriptions through c...
Aug 6, 2025This vulnerability in the HT Mega WordPress plugin allows authenticated users with Contributor-level access or higher to delete arbitrary files and mo...
Jul 31, 2025This CVE describes an authorization bypass vulnerability in Tuleap where authenticated users can access confidential artifact information they shouldn...
Jul 29, 2025This vulnerability in JetBrains TeamCity allows unauthorized users to access sensitive build configuration settings through snapshot dependencies. It ...
Jul 28, 2025An incorrect authorization vulnerability in GitHub Enterprise Server allowed contractor accounts to read internal repository contents when the Contrac...
Jul 15, 2025This vulnerability in Oracle PeopleSoft Enterprise PeopleTools allows unauthenticated attackers to read sensitive data by tricking users into clicking...
Jul 15, 2025In affected Splunk Enterprise and Cloud Platform versions, a low-privileged user with read-only access to a specific alert can suppress that alert whe...
Jul 7, 2025About Incorrect Authorization (CWE-863)
The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.
Our database tracks 712 CVEs classified as CWE-863, with 140 rated critical and 315 rated high severity. The average CVSS score for Incorrect Authorization vulnerabilities is 7.3.
External reference: View CWE-863 on MITRE CWE →
Monitor Incorrect Authorization Vulnerabilities
Get alerted when new Incorrect Authorization CVEs affect your infrastructure.
Start Monitoring Free