CWE-863: Incorrect Authorization

The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.

715
Total CVEs
140
Critical
318
High
7.3
Avg CVSS
3
In CISA KEV

Yearly Trend

2026
77
2025
260
2024
164
2023
97
2022
35

Top Affected Vendors

1 Oracle 34
2 Apple 26
3 Adobe 23
4 Google 19
5 Mattermost 18
6 Gitlab 16
7 Ibm 13
8 Apache 10
9 Wso2 7
10 Lunary 7

All Incorrect Authorization CVEs (715)

CVE-2025-13324
3.7

This vulnerability allows attackers who obtain remote cluster invite tokens to authenticate as remote clusters and perform limited actions on shared c...

Dec 17, 2025
CVE-2025-15288
3.1

CVE-2025-15288 is an improper access control vulnerability in Tanium Interact that could allow authenticated users to access data or perform actions b...

Jan 29, 2026
CVE-2025-68940
3.1

This vulnerability allows users with insufficient permissions to delete branches after merging pull requests in Gitea instances. It affects all Gitea ...

Dec 26, 2025
CVE-2025-41436
3.1

Mattermost versions before 11.0 fail to properly enforce the 'Allow users to view archived channels' setting, allowing regular users to access archive...

Nov 14, 2025
CVE-2025-67740
2.7

This vulnerability in JetBrains TeamCity allows improper access control that could expose GitHub App token metadata. It affects organizations using Te...

Dec 11, 2025
CVE-2026-26205
N/A

This vulnerability in opa-envoy-plugin allows attackers to bypass authorization policies by crafting HTTP requests with double-slash prefixes in paths...

Feb 19, 2026
CVE-2026-25565
N/A

This CVE describes an authorization vulnerability in WeKan where users with read-only board roles can perform card updates that should require write p...

Feb 7, 2026
CVE-2026-25568
N/A

This CVE describes an authorization bypass vulnerability in WeKan where the allowPrivateOnly configuration setting is not properly enforced. When enab...

Feb 7, 2026
CVE-2026-25859
N/A

This vulnerability in Wekan allows non-administrative users to access migration functionality due to insufficient permission checks. This could enable...

Feb 7, 2026
CVE-2026-25561
N/A

This vulnerability in WeKan allows attackers to upload attachments to arbitrary locations by exploiting inconsistent validation of object relationship...

Feb 7, 2026
CVE-2025-66005
N/A

This vulnerability in InputPlumber's D-Bus interface allows local attackers to bypass authorization checks. Attackers can cause denial-of-service, lea...

Jan 14, 2026
CVE-2025-14987
N/A

This vulnerability allows workers authorized for one Temporal namespace to create, signal, or cancel workflows in other namespaces when cross-namespac...

Dec 30, 2025
CVE-2025-14986
N/A

This vulnerability allows users authorized for one Temporal namespace to bypass that namespace's validation rules and feature gates by specifying a di...

Dec 30, 2025
CVE-2025-13829
N/A

This CVE describes an incorrect authorization vulnerability in Data Illusion Zumbrunn NGSurvey that allows any authenticated user to access private in...

Dec 1, 2025
CVE-2025-11862
N/A

CVE-2025-11862 is an authorization bypass vulnerability in Verve Asset Manager that allows read-only users to perform unauthorized user management ope...

Nov 11, 2025

About Incorrect Authorization (CWE-863)

The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.

Our database tracks 715 CVEs classified as CWE-863, with 140 rated critical and 318 rated high severity. The average CVSS score for Incorrect Authorization vulnerabilities is 7.3.

External reference: View CWE-863 on MITRE CWE →

Monitor Incorrect Authorization Vulnerabilities

Get alerted when new Incorrect Authorization CVEs affect your infrastructure.

Start Monitoring Free