CWE-863: Incorrect Authorization

The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.

710
Total CVEs
138
Critical
315
High
7.3
Avg CVSS
3
In CISA KEV

Yearly Trend

2026
77
2025
260
2024
164
2023
97
2022
35

Top Affected Vendors

1 Oracle 34
2 Apple 26
3 Adobe 23
4 Google 19
5 Mattermost 18
6 Gitlab 16
7 Ibm 13
8 Apache 10
9 Wso2 7
10 Lunary 7

All Incorrect Authorization CVEs (710)

CVE-2023-49734
7.7

This vulnerability allows authenticated Gamma users in Apache Superset to gain unauthorized write permissions to charts they create on dashboards. The...

Dec 19, 2023
CVE-2023-38486
7.7

This vulnerability allows attackers to bypass secure boot protections on Aruba 9200 and 9000 Series Controllers and Gateways, enabling execution of ar...

Sep 6, 2023
CVE-2026-1007
7.6

An incorrect authorization vulnerability in Devolutions Server's virtual gateway component allows attackers to bypass IP deny rules. This affects Devo...

Jan 19, 2026
CVE-2026-22230
7.6

This CVE describes an authorization bypass vulnerability in OPEXUS eCASE Audit where authenticated attackers can modify client-side JavaScript or craf...

Jan 8, 2026
CVE-2024-58260
7.6

A missing server-side validation vulnerability in Rancher Manager allows users with update permissions on other User resources to modify the .username...

Oct 2, 2025
CVE-2025-41246
7.6

VMware Tools for Windows has an improper authorization vulnerability that allows authenticated non-administrative users on a guest VM to access other ...

Sep 29, 2025
CVE-2024-38868
7.6

This vulnerability allows unauthorized users to isolate devices in ManageEngine Endpoint Central due to incorrect authorization checks. Attackers coul...

Aug 30, 2024
CVE-2023-4812
7.6

This vulnerability allows attackers to bypass CODEOWNERS approval requirements in GitLab EE by adding changes to previously approved merge requests. I...

Jan 12, 2024
CVE-2023-5553
7.6

This vulnerability allows attackers to bypass Secure Boot protection on AXIS OS devices, potentially enabling unauthorized firmware modifications or p...

Nov 21, 2023
CVE-2026-29087
7.5

This vulnerability allows attackers to bypass route-based middleware protections in @hono/node-server applications by using URL-encoded slashes (%2F) ...

Mar 6, 2026
CVE-2026-26316
7.5

This vulnerability allows attackers to bypass authentication in OpenClaw's BlueBubbles iMessage plugin by sending webhook requests from localhost addr...

Feb 19, 2026
CVE-2025-13928
7.5

This vulnerability allows unauthenticated attackers to cause denial of service on GitLab instances by exploiting incorrect authorization validation in...

Jan 22, 2026
CVE-2024-32643
7.5

Masa CMS versions prior to 7.2.8, 7.3.13, and 7.4.6 contain an authorization bypass vulnerability. By appending '/tag/' to page URLs, attackers can ac...

Dec 3, 2025
CVE-2025-65073
7.5

OpenStack Keystone versions before 26.0.1, 27.0.0, and 28.0.0 contain an authorization bypass vulnerability where AWS Signature authentication can gra...

Nov 17, 2025
CVE-2025-65002
7.5

This vulnerability in Fujitsu iRMC S6 on M5 servers allows authentication bypass when usernames are exactly 16 characters long. Attackers can potentia...

Nov 12, 2025
CVE-2025-49556
7.5

Adobe Commerce has an incorrect authorization vulnerability that allows attackers to bypass security measures and gain unauthorized read access to sen...

Aug 12, 2025
CVE-2025-52487
7.5

This vulnerability allows attackers to bypass DNN Login IP Filters, enabling login attempts from IP addresses not on the allow list. It affects DNN.PL...

Jun 21, 2025
CVE-2025-26842
7.5

This vulnerability in Znuny allows users with CommunicationLog access to view S/MIME encrypted email content from tickets they shouldn't have access t...

May 8, 2025
CVE-2025-40619
7.5

Bookgy contains an authorization bypass vulnerability (CWE-863) that allows unauthenticated attackers to access private areas or functionality intende...

Apr 29, 2025
CVE-2025-24221
7.5

This vulnerability allows unauthorized access to sensitive keychain data from iOS backups. Attackers with physical access to backup files could extrac...

Mar 31, 2025
CVE-2025-2242
7.5

This CVE describes an improper access control vulnerability in GitLab where users who were previously instance administrators but have been downgraded...

Mar 27, 2025
CVE-2025-21565
7.5

An unauthenticated remote attacker can exploit this vulnerability in Oracle Agile PLM Framework to access sensitive data without authorization. This a...

Jan 21, 2025
CVE-2024-39025
7.5

CVE-2024-39025 is an incorrect access control vulnerability in the /users endpoint of Cpacker MemGPT v0.3.17 that allows attackers to access sensitive...

Dec 27, 2024
CVE-2024-48651
7.5

This ProFTPD vulnerability allows authenticated users to gain unintended access to files owned by group ID 0 (root group) due to improper supplemental...

Nov 29, 2024
CVE-2024-21287
7.5

This vulnerability in Oracle Agile PLM Framework allows unauthenticated attackers to remotely access sensitive data via HTTP. It affects organizations...

Nov 18, 2024
CVE-2024-50647
7.5

CVE-2024-50647 is an authorization bypass vulnerability in python_food ordering system V1.0 that allows attackers to access sensitive user information...

Nov 15, 2024
CVE-2024-50650
7.5

python_book V1.0 has an incorrect access control vulnerability that allows attackers to access sensitive user information by manipulating ID parameter...

Nov 15, 2024
CVE-2024-44289
7.5

This CVE describes a privacy vulnerability in macOS where applications could access sensitive location information from system logs. The issue affects...

Oct 28, 2024
CVE-2024-10295
7.5

CVE-2024-10295 is an authentication bypass vulnerability in APICast (Red Hat 3scale API Gateway) where malformed Basic Authentication headers with spe...

Oct 24, 2024
CVE-2024-21259
7.5

This CVE describes a vulnerability in Oracle VM VirtualBox that allows a high-privileged attacker with local access to the host system to potentially ...

Oct 15, 2024
CVE-2024-43131
7.5

This vulnerability allows unauthenticated attackers to delete arbitrary posts and pages in WordPress sites using the vulnerable Docket plugin. It affe...

Aug 13, 2024
CVE-2024-42473
7.5

OpenFGA versions 1.5.7 and 1.5.8 contain an authorization bypass vulnerability when using Check API with models containing 'but not' and 'from' expres...

Aug 12, 2024
CVE-2024-1738
7.5

This vulnerability allows unauthorized users to access any organization's evaluation results by simply knowing the evaluation ID, due to missing proje...

Apr 16, 2024
CVE-2024-27139
7.5

This vulnerability in Apache Archiva allows unauthenticated attackers to modify user account data, potentially leading to account takeover. It affects...

Mar 1, 2024
CVE-2023-52374
7.5

This CVE describes a permission control vulnerability in the package management module of Huawei/HarmonyOS systems. Successful exploitation could allo...

Feb 18, 2024
CVE-2023-47142
7.5

This vulnerability in IBM Tivoli Application Dependency Discovery Manager allows attackers on the local network to escalate privileges through unautho...

Feb 2, 2024
CVE-2023-49246
7.5

This CVE describes an unauthorized access vulnerability in Huawei's card management module, allowing attackers to bypass authentication and access sen...

Dec 6, 2023
CVE-2023-46992
7.5

CVE-2023-46992 is an authentication bypass vulnerability in TOTOLINK A3300R routers that allows unauthenticated attackers to reset critical passwords ...

Oct 31, 2023
CVE-2023-45899
7.5

This authentication bypass vulnerability in the SuperUser module for PrestaShop allows attackers to gain unauthorized administrative access without va...

Oct 31, 2023
CVE-2023-40829
7.5

This vulnerability allows unauthorized access to administrative interfaces in Tencent Enterprise WeChat Privatization deployments. Attackers can bypas...

Oct 12, 2023
CVE-2023-30995
7.5

This vulnerability allows attackers to bypass IP whitelist restrictions in IBM Aspera Faspex by sending specially crafted HTTP requests. Affected orga...

Sep 8, 2023
CVE-2023-32783
7.5

This vulnerability allows attackers to bypass audit detection in Zoho ManageEngine ADAudit Plus by creating or renaming user accounts with a '$' suffi...

Aug 7, 2023
CVE-2023-29708
7.5

This vulnerability allows attackers to force a factory reset on WavLink WavRouter devices via a crafted payload sent to the /cgi-bin/adm.cgi endpoint....

Jun 22, 2023
CVE-2023-34161
7.5

This CVE describes an improper authorization vulnerability in Huawei's SettingsProvider module that allows unauthorized access to system settings. Att...

Jun 19, 2023
CVE-2023-22248
7.5

This CVE describes an incorrect authorization vulnerability in Adobe Commerce that allows attackers to bypass security features and access other users...

Jun 15, 2023
CVE-2023-33651
7.5

This vulnerability allows attackers to bypass authorization rules in Sitecore's MVC Device Simulator component, potentially accessing restricted funct...

Jun 6, 2023
CVE-2023-31226
7.5

This vulnerability in Huawei's MediaPlaybackController SDK allows unauthorized access to media playback functionality due to improper permission verif...

May 26, 2023
CVE-2023-22620
7.5

This vulnerability in SecurePoint UTM firewalls allows attackers to obtain valid session IDs through invalid authentication attempts. These stolen ses...

Apr 12, 2023
CVE-2022-0920
7.5

The Salon booking system WordPress plugins (Free and Pro) before version 7.6.3 have improper authorization in some API endpoints. This allows customer...

Apr 11, 2022
CVE-2021-37517
7.5

This CVE describes an access control vulnerability in Dolibarr ERP/CRM's forgot-password function that allows email addresses as usernames, enabling a...

Mar 31, 2022

About Incorrect Authorization (CWE-863)

The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.

Our database tracks 710 CVEs classified as CWE-863, with 138 rated critical and 315 rated high severity. The average CVSS score for Incorrect Authorization vulnerabilities is 7.3.

External reference: View CWE-863 on MITRE CWE →

Monitor Incorrect Authorization Vulnerabilities

Get alerted when new Incorrect Authorization CVEs affect your infrastructure.

Start Monitoring Free