CWE-863: Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.
Yearly Trend
Top Affected Vendors
All Incorrect Authorization CVEs (710)
This vulnerability in HTCondor allows users authenticating with SciTokens to gain unauthorized access beyond their intended permissions. It affects HT...
Dec 16, 2021This vulnerability allows authenticated low-privilege users on FortiWLC wireless LAN controllers to bypass GUI restrictions and execute arbitrary comm...
Dec 8, 2021The AutomatorWP WordPress plugin before version 1.7.6 lacks proper capability checks on AJAX endpoints, allowing authenticated users with Subscriber r...
Nov 1, 2021This vulnerability allows attackers to bypass file upload blacklists in WUZHI CMS, potentially leading to remote code execution. It affects all WUZHI ...
Sep 21, 2021This vulnerability in MediaWiki's FileImporter extension allows users with insufficient permissions to upload files when certain relaxed configuration...
Jul 2, 2021CVE-2020-20471 is an unauthorized access vulnerability in White Shark System (WSS) 1.3.2 that allows remote attackers to escalate privileges to admin ...
Jun 21, 2021This vulnerability allows a nearby Bluetooth device to bypass authentication during Bluetooth Mesh provisioning, potentially gaining unauthorized acce...
May 24, 2021This vulnerability allows a low-privileged attacker with local Windows access to insert malicious files into the TIBCO Messaging installation director...
Apr 14, 2021This vulnerability allows a low-privileged attacker with local Windows access to insert malicious files into TIBCO Enterprise Message Service installa...
Mar 23, 2021This CVE describes a local privilege escalation vulnerability in TIBCO eFTL installations on Windows. A low-privileged attacker with local access can ...
Mar 23, 2021This vulnerability allows a low-privileged attacker with local Windows access to insert malicious software into TIBCO FTL installation directories, wh...
Mar 23, 2021CVE-2020-25239 is an authorization bypass vulnerability in Siemens SINEMA Remote Connect Server that allows unprivileged users to modify UMC authoriza...
Mar 15, 2021This vulnerability allows attackers to bypass authentication during SAML login in Zoho ManageEngine ServiceDesk Plus. Affected organizations using SAM...
Mar 13, 2021This vulnerability allows any authenticated user (without administrative privileges) on Cisco Connected Mobile Experiences (CMX) to change any user's ...
Jan 13, 2021A privilege escalation vulnerability in Combodo iTop allows authenticated users with webhook creation permissions (typically administrators) to execut...
Nov 10, 2025This vulnerability in NVIDIA BlueField management interface allows local attackers to bypass authorization checks and modify system configuration. Exp...
Sep 4, 2025This vulnerability allows users with DBADM authority in IBM Db2 to access other databases and read or modify files beyond their intended permissions. ...
Dec 9, 2021This vulnerability allows attackers to execute unauthorized commands on GPU micronodes, leading to memory corruption and potential system compromise. ...
Jun 3, 2025CVE-2025-0781 is a sandbox escape vulnerability in FlightGear's Nasal scripting engine that allows attackers to write arbitrary files to any location ...
Jan 28, 2025This CVE describes a sandbox escape vulnerability in macOS that allows a sandboxed process to bypass security restrictions. It affects macOS Ventura a...
Oct 28, 2024CVE-2020-17354 is a security bypass vulnerability in LilyPond music engraving software that allows attackers to execute arbitrary code despite the -ds...
Apr 15, 2023CVE-2021-39206 is an authorization bypass vulnerability in Pomerium's underlying Envoy proxy that could allow specially crafted requests to bypass pat...
Sep 9, 2021This vulnerability allows malicious OSAX scripting additions to bypass macOS Gatekeeper security checks and sandbox restrictions, potentially enabling...
Aug 24, 2021This vulnerability in Plex Media Server allows attackers to obtain permanent access tokens using transient tokens via the /myplex/account API endpoint...
Jan 2, 2026This vulnerability in Axis Communication's ACAP Application framework allows applications to bypass D-Bus method restrictions, potentially enabling un...
Mar 4, 2025This vulnerability in GitLab CE/EE allows unauthorized access to the Kubernetes agent in a cluster under specific configurations. Attackers could pote...
Nov 14, 2024This vulnerability in WSO2 products allows attackers to impersonate legitimate users through JIT provisioning flaws. Organizations using WSO2 products...
Dec 15, 2023CVE-2021-32960 is an authentication bypass vulnerability in Rockwell Automation FactoryTalk Services Platform that allows authenticated remote attacke...
Apr 1, 2022This CVE describes an incorrect authorization vulnerability in Adobe ColdFusion that allows high-privileged attackers to bypass security controls and ...
May 13, 2025This vulnerability allows attackers to bypass access controls in Ruochan Smart firmware update processes, enabling unauthorized access to sensitive in...
Oct 24, 2024This vulnerability allows attackers to extract sensitive information from Sylvania Smart Home firmware by analyzing the APK file. Attackers can access...
Oct 24, 2024This vulnerability in Wear Sync v1.2.0 allows attackers to extract sensitive information from the APK file due to improper access controls in firmware...
Oct 24, 2024In Capsule v0.7.0 and earlier, tenant owners can patch arbitrary namespaces that haven't been taken over by tenants, allowing them to gain control of ...
Aug 20, 2024This CVE describes a sandbox escape vulnerability in Deno where granting file read/write permissions could unintentionally provide broader system acce...
May 7, 2024This vulnerability in IBM Administration Runtime Expert for i allows local users to bypass proper authority checks and access sensitive information th...
Dec 1, 2023CVE-2023-26097 is an authorization bypass vulnerability in Telindus Apsal software that allows unauthorized users to modify application behavior. This...
Apr 24, 2023This vulnerability allows a user with standard permissions to access protected graphics memory regions due to improper access control in register conf...
Jun 14, 2022SuiteCRM versions 7.14.7 and prior, and 8.0.0-beta.1 through 8.9.0 have an access control vulnerability where low-privileged users can view and create...
Nov 8, 2025This vulnerability allows unauthorized users to list, view, edit, create, or delete all objects with object-management configurations in Valtimo Busin...
May 30, 2025This vulnerability allows attackers to bypass authorization controls in ManageEngine Endpoint Central's remote office deployment configurations. Attac...
Aug 23, 2024This vulnerability allows unauthenticated attackers with network access to bypass authentication and gain administrative privileges on Emerson gas chr...
Feb 9, 2024This vulnerability in XWiki Platform allows attackers to execute Velocity scripts without proper script rights through the document tree. This affects...
Dec 21, 2023This vulnerability in REVA's GRPC authorization middleware allows attackers to bypass scope verification on public links. Malicious users can exploit ...
Feb 6, 2026Pexip Infinity versions 15.0 through 38.0 have an improper access control vulnerability in the Secure Scheduler for Exchange service when using Office...
Dec 25, 2025This vulnerability allows administrators with access to /Applications to escalate privileges after uninstalling Pritunl Client. By replacing the remov...
Apr 19, 2025This CVE describes an incorrect authorization vulnerability in Adobe Commerce that allows attackers to bypass security measures and gain unauthorized ...
Feb 11, 2025This vulnerability in GitLab allows an attacker to trigger CI/CD pipelines as another user under specific conditions, potentially executing unauthoriz...
Oct 11, 2024This vulnerability in Misskey allows attackers to spoof signed ActivityPub activity objects by exploiting improper JSON normalization. Attackers can i...
Jun 3, 2024This vulnerability in Deno runtime version 1.39.0 allows arbitrary file descriptor manipulation, enabling attackers to bypass permission prompts and a...
Mar 21, 2024This vulnerability in GitLab EE Ultimate allows attackers to impersonate users in CI/CD pipelines through direct transfer group imports. Attackers cou...
Oct 2, 2023About Incorrect Authorization (CWE-863)
The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.
Our database tracks 710 CVEs classified as CWE-863, with 138 rated critical and 315 rated high severity. The average CVSS score for Incorrect Authorization vulnerabilities is 7.3.
External reference: View CWE-863 on MITRE CWE →
Monitor Incorrect Authorization Vulnerabilities
Get alerted when new Incorrect Authorization CVEs affect your infrastructure.
Start Monitoring Free