CWE-863: Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.
Yearly Trend
Top Affected Vendors
All Incorrect Authorization CVEs (710)
This vulnerability allows remote attackers with low-privileged authorization tokens to escalate privileges on Autel MaxiCharger AC Wallbox Commercial ...
Jun 25, 2025The AI Engine WordPress plugin (versions 2.8.0-2.8.3) has a missing capability check that allows authenticated users with subscriber-level access or h...
Jun 19, 2025This vulnerability allows any XWiki user with edit rights on an App Within Minutes application to escalate privileges to programming rights, leading t...
Jun 13, 2025An incorrect authorization vulnerability in Drupal Commerce Eurobank (Redirect) module allows attackers to misuse functionality they shouldn't have ac...
Jun 11, 2025An incorrect authorization vulnerability in TCMAN's GIM v11 allows unauthenticated attackers to create privileged user accounts via a POST request to ...
Jun 9, 2025This vulnerability allows authenticated users with read-only permissions in Apache Superset to take ownership of dashboards, charts, or datasets. This...
May 13, 2025CVE-2025-46265 is an improper authorization vulnerability in F5OS where remotely authenticated users (via LDAP, RADIUS, or TACACS+) may be granted hig...
May 7, 2025This vulnerability allows attackers to bypass authorization checks in Hitachi Vantara Pentaho Business Analytics Server, potentially accessing unautho...
Feb 19, 2025This vulnerability allows authenticated Cassandra users to bypass Role-Based Access Control (RBAC) and escalate privileges in systems running the Inst...
Feb 13, 2025CVE-2024-57434 is an incorrect access control vulnerability in macrozheng mall-tiny 1.0.1 where default imported test users are granted super administ...
Jan 31, 2025This vulnerability in Qlik Sense Enterprise for Windows allows unprivileged users with network access to create connection objects that execute arbitr...
Dec 9, 2024A privilege escalation vulnerability in Veeam Backup & Replication allows authenticated low-privileged users to remotely start agents in server mode a...
Dec 4, 2024The Victure RX1800 WiFi 6 Router has Telnet enabled by default with admin/admin credentials, allowing attackers on the local network to gain root acce...
Dec 2, 2024The Victure RX1800 WiFi 6 Router has a vulnerability where attackers within Wi-Fi range can derive the default Wi-Fi password using the last 4 octets ...
Dec 2, 2024This vulnerability in Click Studios Passwordstate allows authenticated users to escalate their permissions when editing folders, potentially gaining u...
Nov 29, 2024Chamilo LMS 1.11.26 has an incorrect access control vulnerability in the profile management component that allows non-admin users to manipulate sensit...
Nov 4, 2024This vulnerability allows authenticated users in Checkmk monitoring systems to bypass two-factor authentication (2FA) via the REST API. Attackers with...
Sep 23, 2024This vulnerability allows authenticated attackers to manipulate API parameters in Symphony XTS Web Trading and Mobile Trading platforms, potentially l...
Sep 3, 2024This vulnerability in Italtel Embrace 1.6.4 exposes user access tokens in URL query strings via GET requests, allowing attackers to steal session cred...
Aug 20, 2024This vulnerability in Siemens SINEC NMS allows authenticated attackers to bypass authorization checks and elevate their privileges within the applicat...
Aug 13, 2024Nimble Commander has a privilege escalation vulnerability where the PrivilegedIOHelperV2 server fails to properly validate client authorization before...
Jul 26, 2024This vulnerability allows attackers to gain root-level access to AdTran SRG 834-5 devices during initial setup when SSH is enabled with default admin/...
Jul 24, 2024This vulnerability in Evmos allows users to create vesting accounts funded by arbitrary third-party addresses without their permission. Attackers coul...
Jul 5, 2024This vulnerability in FreeIPA allows attackers to bypass constrained delegation rules in Kerberos S4U2Proxy requests, enabling unauthorized service im...
Jun 12, 2024This vulnerability in the Login/Signup Popup plugin for WordPress allows authenticated users with Subscriber-level access or higher to modify arbitrar...
Jun 6, 2024This vulnerability allows attackers with access to Devolutions Server's PAM JIT elevation feature to escalate privileges to unauthorized groups via cr...
Mar 26, 2024This vulnerability allows attackers to bypass access controls in the School Fees Management System v1.0, enabling privilege escalation to administrati...
Mar 21, 2024This vulnerability in facileManager allows non-admin users to escalate their privileges to super user/admin level by manipulating profile update reque...
Jan 31, 2024This vulnerability in Rancher 2.x allows users with namespace access to move namespaces between projects without proper authorization. It affects Ranc...
Dec 12, 2023The Fancy Product Designer WordPress plugin has an authorization vulnerability that allows authenticated users with subscriber-level permissions to mo...
Oct 20, 2023This CVE-2023-38218 vulnerability in Adobe Commerce allows authenticated attackers to bypass authorization controls, potentially exposing sensitive in...
Oct 13, 2023This CVE describes an incorrect authorization vulnerability in FortiMail webmail that allows authenticated attackers to log into other users' accounts...
Oct 10, 2023This vulnerability in ProIntegra Uptime DC software allows regular users to change passwords for all other users, including administrators, leading to...
Oct 4, 2023This vulnerability allows low-privileged users to execute restricted actions intended only for high-privileged users due to improper authentication in...
Aug 17, 2023This vulnerability in TapHome's core platform allows authenticated low-privileged users to change other users' passwords without authorization. Attack...
Jul 17, 2023This vulnerability allows Firefox/Thunderbird extensions to bypass permission prompts when opening external schemes (like file://, mailto:, etc.), ena...
Jun 2, 2023CVE-2022-46308 is an authorization bypass vulnerability in SGUDA U-Lock central lock control service's user management function. Remote attackers with...
Jun 2, 2023A lateral privilege escalation vulnerability in XXL-Job v2.4.1 allows authenticated users to execute arbitrary commands on other users' accounts via a...
May 26, 2023This vulnerability allows unauthorized users to generate internal reports in MyQ Solution Print Server and Central Server by accessing a direct URL, b...
Apr 26, 2023This vulnerability allows low-privileged users to upload and install packages, potentially leading to remote code execution on affected StruxureWare D...
Apr 18, 2023This vulnerability in Hitachi Vantara Pentaho Business Analytics Server allows unauthorized users to access data source management functions due to im...
Apr 3, 2023This vulnerability allows network-adjacent attackers to bypass authentication on NETGEAR R6700v3 routers by exploiting incorrect string matching logic...
Mar 29, 2023Delta Electronics InfraSuite Device Master versions before 1.0.5 contain an improper access control vulnerability in the Device-Gateway service. Attac...
Mar 27, 2023The ProfileGrid WordPress plugin before version 5.3.1 contains an authorization bypass vulnerability in its password reset functionality. This allows ...
Mar 20, 2023This vulnerability in SaltStack Salt allows users with locked accounts to continue executing Salt commands if they were previously authenticated. It a...
Jun 23, 2022This vulnerability in ZTE's ZXMP M721 product involves incorrect SFTP folder permission reporting (showing 666 instead of actual permissions), allowin...
May 12, 2022CVE-2021-42192 is an incorrect access control vulnerability in Konga v0.14.9 that allows authenticated users to escalate privileges to admin level thr...
May 4, 2022CVE-2022-0981 is an authorization bypass vulnerability in Quarkus's RestEasy Reactive component where user state and permissions can leak between web ...
Mar 23, 2022This vulnerability allows any authenticated user in Keycloak to create new default user accounts via the administrative REST API, even when new user r...
Jan 25, 2022This vulnerability allows attackers to bypass iframe sandbox navigation restrictions in Google Chrome, potentially enabling malicious websites to perf...
Dec 23, 2021About Incorrect Authorization (CWE-863)
The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.
Our database tracks 710 CVEs classified as CWE-863, with 138 rated critical and 315 rated high severity. The average CVSS score for Incorrect Authorization vulnerabilities is 7.3.
External reference: View CWE-863 on MITRE CWE →
Monitor Incorrect Authorization Vulnerabilities
Get alerted when new Incorrect Authorization CVEs affect your infrastructure.
Start Monitoring Free