CWE-863: Incorrect Authorization

The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.

710
Total CVEs
138
Critical
315
High
7.3
Avg CVSS
3
In CISA KEV

Yearly Trend

2026
77
2025
260
2024
164
2023
97
2022
35

Top Affected Vendors

1 Oracle 34
2 Apple 26
3 Adobe 23
4 Google 19
5 Mattermost 18
6 Gitlab 16
7 Ibm 13
8 Apache 10
9 Wso2 7
10 Lunary 7

All Incorrect Authorization CVEs (710)

CVE-2025-5822
8.8

This vulnerability allows remote attackers with low-privileged authorization tokens to escalate privileges on Autel MaxiCharger AC Wallbox Commercial ...

Jun 25, 2025
CVE-2025-5071
8.8

The AI Engine WordPress plugin (versions 2.8.0-2.8.3) has a missing capability check that allows authenticated users with subscriber-level access or h...

Jun 19, 2025
CVE-2025-49586
8.8

This vulnerability allows any XWiki user with edit rights on an App Within Minutes application to escalate privileges to programming rights, leading t...

Jun 13, 2025
CVE-2025-48445
8.8

An incorrect authorization vulnerability in Drupal Commerce Eurobank (Redirect) module allows attackers to misuse functionality they shouldn't have ac...

Jun 11, 2025
CVE-2025-40670
8.8

An incorrect authorization vulnerability in TCMAN's GIM v11 allows unauthenticated attackers to create privileged user accounts via a POST request to ...

Jun 9, 2025
CVE-2025-27696
8.8

This vulnerability allows authenticated users with read-only permissions in Apache Superset to take ownership of dashboards, charts, or datasets. This...

May 13, 2025
CVE-2025-46265
8.8

CVE-2025-46265 is an improper authorization vulnerability in F5OS where remotely authenticated users (via LDAP, RADIUS, or TACACS+) may be granted hig...

May 7, 2025
CVE-2024-5705
8.8

This vulnerability allows attackers to bypass authorization checks in Hitachi Vantara Pentaho Business Analytics Server, potentially accessing unautho...

Feb 19, 2025
CVE-2025-26511
8.8

This vulnerability allows authenticated Cassandra users to bypass Role-Based Access Control (RBAC) and escalate privileges in systems running the Inst...

Feb 13, 2025
CVE-2024-57434
8.8

CVE-2024-57434 is an incorrect access control vulnerability in macrozheng mall-tiny 1.0.1 where default imported test users are granted super administ...

Jan 31, 2025
CVE-2024-55579
8.8

This vulnerability in Qlik Sense Enterprise for Windows allows unprivileged users with network access to create connection objects that execute arbitr...

Dec 9, 2024
CVE-2024-42452
8.8

A privilege escalation vulnerability in Veeam Backup & Replication allows authenticated low-privileged users to remotely start agents in server mode a...

Dec 4, 2024
CVE-2024-53937
8.8

The Victure RX1800 WiFi 6 Router has Telnet enabled by default with admin/admin credentials, allowing attackers on the local network to gain root acce...

Dec 2, 2024
CVE-2024-53941
8.8

The Victure RX1800 WiFi 6 Router has a vulnerability where attackers within Wi-Fi range can derive the default Wi-Fi password using the last 4 octets ...

Dec 2, 2024
CVE-2024-54124
8.8

This vulnerability in Click Studios Passwordstate allows authenticated users to escalate their permissions when editing folders, potentially gaining u...

Nov 29, 2024
CVE-2024-30616
8.8

Chamilo LMS 1.11.26 has an incorrect access control vulnerability in the profile management component that allows non-admin users to manipulate sensit...

Nov 4, 2024
CVE-2024-8606
8.8

This vulnerability allows authenticated users in Checkmk monitoring systems to bypass two-factor authentication (2FA) via the REST API. Attackers with...

Sep 23, 2024
CVE-2024-45586
8.8

This vulnerability allows authenticated attackers to manipulate API parameters in Symphony XTS Web Trading and Mobile Trading platforms, potentially l...

Sep 3, 2024
CVE-2024-31842
8.8

This vulnerability in Italtel Embrace 1.6.4 exposes user access tokens in URL query strings via GET requests, allowing attackers to steal session cred...

Aug 20, 2024
CVE-2024-41939
8.8

This vulnerability in Siemens SINEC NMS allows authenticated attackers to bypass authorization checks and elevate their privileges within the applicat...

Aug 13, 2024
CVE-2024-7062
8.8

Nimble Commander has a privilege escalation vulnerability where the PrivilegedIOHelperV2 server fails to properly validate client authorization before...

Jul 26, 2024
CVE-2024-31970
8.8

This vulnerability allows attackers to gain root-level access to AdTran SRG 834-5 devices during initial setup when SSH is enabled with default admin/...

Jul 24, 2024
CVE-2024-39696
8.8

This vulnerability in Evmos allows users to create vesting accounts funded by arbitrary third-party addresses without their permission. Attackers coul...

Jul 5, 2024
CVE-2024-2698
8.8

This vulnerability in FreeIPA allows attackers to bypass constrained delegation rules in Kerberos S4U2Proxy requests, enabling unauthorized service im...

Jun 12, 2024
CVE-2024-5324
8.8

This vulnerability in the Login/Signup Popup plugin for WordPress allows authenticated users with Subscriber-level access or higher to modify arbitrar...

Jun 6, 2024
CVE-2024-2915
8.8

This vulnerability allows attackers with access to Devolutions Server's PAM JIT elevation feature to escalate privileges to unauthorized groups via cr...

Mar 26, 2024
CVE-2023-49982
8.8

This vulnerability allows attackers to bypass access controls in the School Fees Management System v1.0, enabling privilege escalation to administrati...

Mar 21, 2024
CVE-2024-24573
8.8

This vulnerability in facileManager allows non-admin users to escalate their privileges to super user/admin level by manipulating profile update reque...

Jan 31, 2024
CVE-2020-10676
8.8

This vulnerability in Rancher 2.x allows users with namespace access to move namespaces between projects without proper authorization. It affects Ranc...

Dec 12, 2023
CVE-2021-4334
8.8

The Fancy Product Designer WordPress plugin has an authorization vulnerability that allows authenticated users with subscriber-level permissions to mo...

Oct 20, 2023
CVE-2023-38218
8.8

This CVE-2023-38218 vulnerability in Adobe Commerce allows authenticated attackers to bypass authorization controls, potentially exposing sensitive in...

Oct 13, 2023
CVE-2023-36556
8.8

This CVE describes an incorrect authorization vulnerability in FortiMail webmail that allows authenticated attackers to log into other users' accounts...

Oct 10, 2023
CVE-2023-4997
8.8

This vulnerability in ProIntegra Uptime DC software allows regular users to change passwords for all other users, including administrators, leading to...

Oct 4, 2023
CVE-2023-33237
8.8

This vulnerability allows low-privileged users to execute restricted actions intended only for high-privileged users due to improper authentication in...

Aug 17, 2023
CVE-2023-2759
8.8

This vulnerability in TapHome's core platform allows authenticated low-privileged users to change other users' passwords without authorization. Attack...

Jul 17, 2023
CVE-2023-25729
8.8

This vulnerability allows Firefox/Thunderbird extensions to bypass permission prompts when opening external schemes (like file://, mailto:, etc.), ena...

Jun 2, 2023
CVE-2022-46308
8.8

CVE-2022-46308 is an authorization bypass vulnerability in SGUDA U-Lock central lock control service's user management function. Remote attackers with...

Jun 2, 2023
CVE-2023-33779
8.8

A lateral privilege escalation vulnerability in XXL-Job v2.4.1 allows authenticated users to execute arbitrary commands on other users' accounts via a...

May 26, 2023
CVE-2023-27107
8.8

This vulnerability allows unauthorized users to generate internal reports in MyQ Solution Print Server and Central Server by accessing a direct URL, b...

Apr 26, 2023
CVE-2023-25547
8.8

This vulnerability allows low-privileged users to upload and install packages, potentially leading to remote code execution on affected StruxureWare D...

Apr 18, 2023
CVE-2022-43940
8.8

This vulnerability in Hitachi Vantara Pentaho Business Analytics Server allows unauthorized users to access data source management functions due to im...

Apr 3, 2023
CVE-2022-27642
8.8

This vulnerability allows network-adjacent attackers to bypass authentication on NETGEAR R6700v3 routers by exploiting incorrect string matching logic...

Mar 29, 2023
CVE-2023-1144
8.8

Delta Electronics InfraSuite Device Master versions before 1.0.5 contain an improper access control vulnerability in the Device-Gateway service. Attac...

Mar 27, 2023
CVE-2023-0940
8.8

The ProfileGrid WordPress plugin before version 5.3.1 contains an authorization bypass vulnerability in its password reset functionality. This allows ...

Mar 20, 2023
CVE-2022-22967
8.8

This vulnerability in SaltStack Salt allows users with locked accounts to continue executing Salt commands if they were previously authenticated. It a...

Jun 23, 2022
CVE-2022-23139
8.8

This vulnerability in ZTE's ZXMP M721 product involves incorrect SFTP folder permission reporting (showing 666 instead of actual permissions), allowin...

May 12, 2022
CVE-2021-42192
8.8

CVE-2021-42192 is an incorrect access control vulnerability in Konga v0.14.9 that allows authenticated users to escalate privileges to admin level thr...

May 4, 2022
CVE-2022-0981
8.8

CVE-2022-0981 is an authorization bypass vulnerability in Quarkus's RestEasy Reactive component where user state and permissions can leak between web ...

Mar 23, 2022
CVE-2021-4133
8.8

This vulnerability allows any authenticated user in Keycloak to create new default user accounts via the administrative REST API, even when new user r...

Jan 25, 2022
CVE-2021-38017
8.8

This vulnerability allows attackers to bypass iframe sandbox navigation restrictions in Google Chrome, potentially enabling malicious websites to perf...

Dec 23, 2021

About Incorrect Authorization (CWE-863)

The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.

Our database tracks 710 CVEs classified as CWE-863, with 138 rated critical and 315 rated high severity. The average CVSS score for Incorrect Authorization vulnerabilities is 7.3.

External reference: View CWE-863 on MITRE CWE →

Monitor Incorrect Authorization Vulnerabilities

Get alerted when new Incorrect Authorization CVEs affect your infrastructure.

Start Monitoring Free