CWE-863: Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.
Yearly Trend
Top Affected Vendors
All Incorrect Authorization CVEs (715)
This vulnerability allows attackers who obtain remote cluster invite tokens to authenticate as remote clusters and perform limited actions on shared c...
Dec 17, 2025CVE-2025-15288 is an improper access control vulnerability in Tanium Interact that could allow authenticated users to access data or perform actions b...
Jan 29, 2026This vulnerability allows users with insufficient permissions to delete branches after merging pull requests in Gitea instances. It affects all Gitea ...
Dec 26, 2025Mattermost versions before 11.0 fail to properly enforce the 'Allow users to view archived channels' setting, allowing regular users to access archive...
Nov 14, 2025This vulnerability in JetBrains TeamCity allows improper access control that could expose GitHub App token metadata. It affects organizations using Te...
Dec 11, 2025This vulnerability in opa-envoy-plugin allows attackers to bypass authorization policies by crafting HTTP requests with double-slash prefixes in paths...
Feb 19, 2026This CVE describes an authorization vulnerability in WeKan where users with read-only board roles can perform card updates that should require write p...
Feb 7, 2026This CVE describes an authorization bypass vulnerability in WeKan where the allowPrivateOnly configuration setting is not properly enforced. When enab...
Feb 7, 2026This vulnerability in Wekan allows non-administrative users to access migration functionality due to insufficient permission checks. This could enable...
Feb 7, 2026This vulnerability in WeKan allows attackers to upload attachments to arbitrary locations by exploiting inconsistent validation of object relationship...
Feb 7, 2026This vulnerability in InputPlumber's D-Bus interface allows local attackers to bypass authorization checks. Attackers can cause denial-of-service, lea...
Jan 14, 2026This vulnerability allows workers authorized for one Temporal namespace to create, signal, or cancel workflows in other namespaces when cross-namespac...
Dec 30, 2025This vulnerability allows users authorized for one Temporal namespace to bypass that namespace's validation rules and feature gates by specifying a di...
Dec 30, 2025This CVE describes an incorrect authorization vulnerability in Data Illusion Zumbrunn NGSurvey that allows any authenticated user to access private in...
Dec 1, 2025CVE-2025-11862 is an authorization bypass vulnerability in Verve Asset Manager that allows read-only users to perform unauthorized user management ope...
Nov 11, 2025About Incorrect Authorization (CWE-863)
The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.
Our database tracks 715 CVEs classified as CWE-863, with 140 rated critical and 318 rated high severity. The average CVSS score for Incorrect Authorization vulnerabilities is 7.3.
External reference: View CWE-863 on MITRE CWE →
Monitor Incorrect Authorization Vulnerabilities
Get alerted when new Incorrect Authorization CVEs affect your infrastructure.
Start Monitoring Free