CWE-863: Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.
Yearly Trend
Top Affected Vendors
All Incorrect Authorization CVEs (710)
This vulnerability allows authenticated Gamma users in Apache Superset to gain unauthorized write permissions to charts they create on dashboards. The...
Dec 19, 2023This vulnerability allows attackers to bypass secure boot protections on Aruba 9200 and 9000 Series Controllers and Gateways, enabling execution of ar...
Sep 6, 2023An incorrect authorization vulnerability in Devolutions Server's virtual gateway component allows attackers to bypass IP deny rules. This affects Devo...
Jan 19, 2026This CVE describes an authorization bypass vulnerability in OPEXUS eCASE Audit where authenticated attackers can modify client-side JavaScript or craf...
Jan 8, 2026A missing server-side validation vulnerability in Rancher Manager allows users with update permissions on other User resources to modify the .username...
Oct 2, 2025VMware Tools for Windows has an improper authorization vulnerability that allows authenticated non-administrative users on a guest VM to access other ...
Sep 29, 2025This vulnerability allows unauthorized users to isolate devices in ManageEngine Endpoint Central due to incorrect authorization checks. Attackers coul...
Aug 30, 2024This vulnerability allows attackers to bypass CODEOWNERS approval requirements in GitLab EE by adding changes to previously approved merge requests. I...
Jan 12, 2024This vulnerability allows attackers to bypass Secure Boot protection on AXIS OS devices, potentially enabling unauthorized firmware modifications or p...
Nov 21, 2023This vulnerability allows attackers to bypass route-based middleware protections in @hono/node-server applications by using URL-encoded slashes (%2F) ...
Mar 6, 2026This vulnerability allows attackers to bypass authentication in OpenClaw's BlueBubbles iMessage plugin by sending webhook requests from localhost addr...
Feb 19, 2026This vulnerability allows unauthenticated attackers to cause denial of service on GitLab instances by exploiting incorrect authorization validation in...
Jan 22, 2026Masa CMS versions prior to 7.2.8, 7.3.13, and 7.4.6 contain an authorization bypass vulnerability. By appending '/tag/' to page URLs, attackers can ac...
Dec 3, 2025OpenStack Keystone versions before 26.0.1, 27.0.0, and 28.0.0 contain an authorization bypass vulnerability where AWS Signature authentication can gra...
Nov 17, 2025This vulnerability in Fujitsu iRMC S6 on M5 servers allows authentication bypass when usernames are exactly 16 characters long. Attackers can potentia...
Nov 12, 2025Adobe Commerce has an incorrect authorization vulnerability that allows attackers to bypass security measures and gain unauthorized read access to sen...
Aug 12, 2025This vulnerability allows attackers to bypass DNN Login IP Filters, enabling login attempts from IP addresses not on the allow list. It affects DNN.PL...
Jun 21, 2025This vulnerability in Znuny allows users with CommunicationLog access to view S/MIME encrypted email content from tickets they shouldn't have access t...
May 8, 2025Bookgy contains an authorization bypass vulnerability (CWE-863) that allows unauthenticated attackers to access private areas or functionality intende...
Apr 29, 2025This vulnerability allows unauthorized access to sensitive keychain data from iOS backups. Attackers with physical access to backup files could extrac...
Mar 31, 2025This CVE describes an improper access control vulnerability in GitLab where users who were previously instance administrators but have been downgraded...
Mar 27, 2025An unauthenticated remote attacker can exploit this vulnerability in Oracle Agile PLM Framework to access sensitive data without authorization. This a...
Jan 21, 2025CVE-2024-39025 is an incorrect access control vulnerability in the /users endpoint of Cpacker MemGPT v0.3.17 that allows attackers to access sensitive...
Dec 27, 2024This ProFTPD vulnerability allows authenticated users to gain unintended access to files owned by group ID 0 (root group) due to improper supplemental...
Nov 29, 2024This vulnerability in Oracle Agile PLM Framework allows unauthenticated attackers to remotely access sensitive data via HTTP. It affects organizations...
Nov 18, 2024CVE-2024-50647 is an authorization bypass vulnerability in python_food ordering system V1.0 that allows attackers to access sensitive user information...
Nov 15, 2024python_book V1.0 has an incorrect access control vulnerability that allows attackers to access sensitive user information by manipulating ID parameter...
Nov 15, 2024This CVE describes a privacy vulnerability in macOS where applications could access sensitive location information from system logs. The issue affects...
Oct 28, 2024CVE-2024-10295 is an authentication bypass vulnerability in APICast (Red Hat 3scale API Gateway) where malformed Basic Authentication headers with spe...
Oct 24, 2024This CVE describes a vulnerability in Oracle VM VirtualBox that allows a high-privileged attacker with local access to the host system to potentially ...
Oct 15, 2024This vulnerability allows unauthenticated attackers to delete arbitrary posts and pages in WordPress sites using the vulnerable Docket plugin. It affe...
Aug 13, 2024OpenFGA versions 1.5.7 and 1.5.8 contain an authorization bypass vulnerability when using Check API with models containing 'but not' and 'from' expres...
Aug 12, 2024This vulnerability allows unauthorized users to access any organization's evaluation results by simply knowing the evaluation ID, due to missing proje...
Apr 16, 2024This vulnerability in Apache Archiva allows unauthenticated attackers to modify user account data, potentially leading to account takeover. It affects...
Mar 1, 2024This CVE describes a permission control vulnerability in the package management module of Huawei/HarmonyOS systems. Successful exploitation could allo...
Feb 18, 2024This vulnerability in IBM Tivoli Application Dependency Discovery Manager allows attackers on the local network to escalate privileges through unautho...
Feb 2, 2024This CVE describes an unauthorized access vulnerability in Huawei's card management module, allowing attackers to bypass authentication and access sen...
Dec 6, 2023CVE-2023-46992 is an authentication bypass vulnerability in TOTOLINK A3300R routers that allows unauthenticated attackers to reset critical passwords ...
Oct 31, 2023This authentication bypass vulnerability in the SuperUser module for PrestaShop allows attackers to gain unauthorized administrative access without va...
Oct 31, 2023This vulnerability allows unauthorized access to administrative interfaces in Tencent Enterprise WeChat Privatization deployments. Attackers can bypas...
Oct 12, 2023This vulnerability allows attackers to bypass IP whitelist restrictions in IBM Aspera Faspex by sending specially crafted HTTP requests. Affected orga...
Sep 8, 2023This vulnerability allows attackers to bypass audit detection in Zoho ManageEngine ADAudit Plus by creating or renaming user accounts with a '$' suffi...
Aug 7, 2023This vulnerability allows attackers to force a factory reset on WavLink WavRouter devices via a crafted payload sent to the /cgi-bin/adm.cgi endpoint....
Jun 22, 2023This CVE describes an improper authorization vulnerability in Huawei's SettingsProvider module that allows unauthorized access to system settings. Att...
Jun 19, 2023This CVE describes an incorrect authorization vulnerability in Adobe Commerce that allows attackers to bypass security features and access other users...
Jun 15, 2023This vulnerability allows attackers to bypass authorization rules in Sitecore's MVC Device Simulator component, potentially accessing restricted funct...
Jun 6, 2023This vulnerability in Huawei's MediaPlaybackController SDK allows unauthorized access to media playback functionality due to improper permission verif...
May 26, 2023This vulnerability in SecurePoint UTM firewalls allows attackers to obtain valid session IDs through invalid authentication attempts. These stolen ses...
Apr 12, 2023The Salon booking system WordPress plugins (Free and Pro) before version 7.6.3 have improper authorization in some API endpoints. This allows customer...
Apr 11, 2022This CVE describes an access control vulnerability in Dolibarr ERP/CRM's forgot-password function that allows email addresses as usernames, enabling a...
Mar 31, 2022About Incorrect Authorization (CWE-863)
The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.
Our database tracks 710 CVEs classified as CWE-863, with 138 rated critical and 315 rated high severity. The average CVSS score for Incorrect Authorization vulnerabilities is 7.3.
External reference: View CWE-863 on MITRE CWE →
Monitor Incorrect Authorization Vulnerabilities
Get alerted when new Incorrect Authorization CVEs affect your infrastructure.
Start Monitoring Free