CWE-863: Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.
Yearly Trend
Top Affected Vendors
All Incorrect Authorization CVEs (710)
CVE-2020-24771 is an incorrect access control vulnerability in NexusPHP that allows unauthorized attackers to access published content without proper ...
Mar 30, 2022CVE-2022-25335 is an access control vulnerability in RigoBlock Dragos smart contracts where the setMultipleAllowances function lacks the onlyOwner mod...
Feb 18, 2022This vulnerability in the WPS Hide Login WordPress plugin allows unauthenticated attackers to discover the secret login page URL by sending a crafted ...
Dec 6, 2021CVE-2020-19765 is a reentrancy vulnerability in the Accounting 1.0 Ethereum smart contract's noReentrance() modifier. Attackers can exploit this to dr...
Sep 7, 2021This vulnerability allows unauthorized TELNET access to certain Shenzhen PENGLIXIN components in DEPSTECH WiFi Digital Microscope 3 devices using defa...
Jul 15, 2021This vulnerability in FreeBSD kernels allows system calls to disable SMAP (Supervisor Mode Access Prevention) protections temporarily, creating a wind...
May 28, 2021This vulnerability allows unauthenticated attackers to retrieve valid WordPress nonces (security tokens) for any action via an AJAX endpoint in the Re...
May 14, 2021CVE-2021-22209 is an authorization bypass vulnerability in GitLab's GraphQL API that allows unauthorized execution of mutations. This affects all GitL...
May 6, 2021CVE-2020-21990 is an information disclosure vulnerability in Emmanuel MyDomoAtHome (MDAH) REST API Domoticz ISS Gateway that allows unauthenticated re...
Apr 29, 2021CVE-2019-15059 allows unauthenticated remote attackers to download Liberty lisPBX configuration backup files containing sensitive PBX information. Thi...
Apr 12, 2021This vulnerability allows unauthenticated attackers to change the administrator password on Acexy Wireless-N WiFi Repeater devices by sending a specia...
Mar 29, 2021The auth_internal plugin in Tiny Tiny RSS (tt-rss) before March 12, 2021 allows attackers to log in using only a valid OTP (one-time password) code wi...
Mar 13, 2021This vulnerability in Visualware MyConnection Server allows unauthorized access to published reports due to improper access control. Attackers can vie...
Feb 19, 2021This vulnerability in Zcashd allows attackers to create alternative blockchain branches that could be incorrectly accepted, potentially enabling doubl...
Feb 5, 2021During Apache Kafka migration from ZooKeeper to KRaft mode, ACL enforcement can fail when removing an ACL from a resource with multiple ACLs, causing ...
Apr 12, 2024This vulnerability in IBM i Access Client Solutions allows attackers to execute remote code on affected PCs by exploiting improper authority checks. A...
Dec 14, 2023The Brizy WordPress plugin up to version 1.0.125 contains an authorization bypass vulnerability due to an incorrect capability check in the is_adminis...
Oct 20, 2023This vulnerability in TurboWarp Desktop allows malicious Scratch projects or custom extensions to read arbitrary files from the user's disk and upload...
Aug 17, 2023This vulnerability allows attackers with network access to Pioneer DMH-WT7600NEX car infotainment systems to bypass authentication and create arbitrar...
Jan 31, 2025This vulnerability in Drupal's Basic HTTP Authentication module allows attackers to bypass authorization checks and access restricted content through ...
Jan 9, 2025SAP LT Replication Server in specified S4CORE versions lacks proper authorization checks, allowing authenticated high-privilege users to escalate priv...
Jan 9, 2024This vulnerability allows authenticated TeamViewer users to bypass the 'Allow after confirmation' security setting during remote sessions. Attackers w...
Feb 5, 2026This CVE describes an authentication bypass vulnerability in Kargo's API endpoints. Unauthenticated attackers can access configuration data (exposing ...
Jan 27, 2026This vulnerability in BlueChi allows a root user on a managed node to create or modify systemd service unit files on the host node, leading to privile...
Dec 24, 2025This vulnerability allows authenticated admin users with Instance Administrator role to execute arbitrary Groovy scripts through Object actions in Lif...
Sep 1, 2025An incorrect authorization vulnerability in Centreon web's API token creation form allows authenticated users to create API tokens with higher privile...
May 13, 2025A privilege escalation vulnerability in Apache CloudStack allows domain admin accounts to query API and secret keys of all account-users, including ro...
Aug 7, 2024This vulnerability allows organizational administrators in CVE Services API to transfer user accounts to arbitrary organizations, granting unintended ...
Jan 26, 2022This vulnerability allows an authenticated administrative user on a BIG-IQ managed BIG-IP device to access other BIG-IP devices managed by the same BI...
Jan 25, 2022This vulnerability in Juniper SRX Series firewalls allows attackers to bypass Deep Packet Inspection rules when 'no-syn-check' is enabled, potentially...
Jan 19, 2022This vulnerability in Juniper SRX Series firewalls allows attackers to bypass Deep Packet Inspection rules when 'no-syn-check' is enabled, potentially...
Jan 19, 2022CVE-2021-41189 is a privilege escalation vulnerability in DSpace 7.0 where community or collection administrators can elevate their permissions to bec...
Oct 29, 2021This vulnerability allows authenticated BIG-IP administrators to bypass Appliance Mode security restrictions using undisclosed iControl REST endpoints...
May 10, 2021CVE-2021-29439 is an improper privilege verification vulnerability in Grav admin plugin that allows users with only login permissions to install third...
Apr 13, 2021This vulnerability allows unauthorized access to the HTML editor route in Tryton trytond due to missing access rights enforcement. Attackers could pot...
Nov 30, 2025Adobe Pass versions 3.7.3 and earlier contain an incorrect authorization vulnerability that allows attackers to bypass security controls and gain unau...
Nov 11, 2025This vulnerability allows low-privileged authenticated users in JumpServer to bypass authorization checks and invoke LDAP configuration tests or synch...
Oct 30, 2025This CVE describes an authorization bypass vulnerability in Siemens SmartClient modules where the server fails to enforce proper access controls on ce...
Aug 12, 2025This vulnerability allows attackers to bypass ACL policies in Nomad event streams configured with wildcard namespaces, enabling unauthorized read acce...
Feb 12, 2025Adobe Commerce has an incorrect authorization vulnerability (CWE-863) that allows low-privileged attackers to bypass security features and perform una...
Feb 11, 2025This vulnerability allows authenticated users in Akamai SIA ThreatAvert to bypass authorization controls and disable policy enforcement by directly ac...
Nov 4, 2024This vulnerability in Oracle Banking Liquidity Management allows authenticated attackers with network access to potentially compromise the system thro...
Oct 15, 2024This vulnerability allows an authenticated GlobalProtect user to impersonate another GlobalProtect user, disconnecting the legitimate user while hidin...
Sep 11, 2024This CVE describes an improper access control vulnerability in the Aimeos GraphQL API admin interface. It allows users with editor permissions to modi...
Jul 2, 2024This vulnerability in the Emarsys SDK for Android allows attackers to bypass authorization checks and launch arbitrary web pages or deep links from th...
Dec 12, 2023CVE-2023-48712 is an authentication bypass vulnerability in Warpgate that allows non-admin users to impersonate admin accounts when single-factor auth...
Nov 24, 2023This vulnerability in Fortinet FortiClient for Windows allows attackers to cause denial of service by sending specially crafted requests to a specific...
Nov 14, 2023This vulnerability allows an authenticated malicious user to take over another user's Grafana account via OAuth login manipulation. It affects Grafana...
Jul 15, 2022An improper authorization flaw in Foreman's Salt plugin for smart-proxy allows authenticated local attackers to execute actions restricted to the Fore...
Mar 30, 2022CVE-2022-0580 is an incorrect authorization vulnerability in LibreNMS that allows authenticated users to access unauthorized functionality. This affec...
Feb 14, 2022About Incorrect Authorization (CWE-863)
The product performs an authorization check when an actor attempts to access a resource, but it does not correctly perform the check.
Our database tracks 710 CVEs classified as CWE-863, with 138 rated critical and 315 rated high severity. The average CVSS score for Incorrect Authorization vulnerabilities is 7.3.
External reference: View CWE-863 on MITRE CWE →
Monitor Incorrect Authorization Vulnerabilities
Get alerted when new Incorrect Authorization CVEs affect your infrastructure.
Start Monitoring Free