CWE-305

Authentication Bypass by Primary Weakness

43 CVEs Avg CVSS 7.5 MITRE
11
CRITICAL
15
HIGH
14
MEDIUM
2
LOW
5
POC
1
KEV

Monthly

CVE-2026-30849 CRITICAL PATCH Act Now

MantisBT versions prior to 2.28.1 contain an authentication bypass vulnerability in the SOAP API caused by improper type checking on the password parameter when running on MySQL family databases. An attacker who knows a victim's username can log in to the SOAP API without knowing the correct password and execute any API function available to that account. While a CVE CVSS score is not yet assigned, the vulnerability is patched in version 2.28.1, and disabling the SOAP API reduces but does not eliminate the risk.

Authentication Bypass
NVD GitHub VulDB
CVSS 4.0
9.3
EPSS
0.1%
CVE-2026-33496 HIGH PATCH This Week

Ory Oathkeeper contains a cache key confusion vulnerability in its oauth2_introspection authenticator that allows attackers to bypass authentication by reusing tokens across different introspection servers. Attackers with a valid token for one configured introspection server can exploit the cache mechanism to gain unauthorized access to resources protected by different introspection servers. This vulnerability requires the specific precondition of multiple oauth2_introspection authenticators with caching enabled, and a patch is available from the vendor.

Authentication Bypass
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2025-31703 LOW Monitor

This vulnerability in Dahua NVR/XVR devices allows unauthenticated privilege escalation through the serial port console by bypassing shell authentication mechanisms. Affected devices include Dahua NVR2-4KS3, XVR4232AN-I/T, and XVR1B16H-I/T models with build dates prior to March 3, 2026. An attacker with physical access to the device can gain a restricted shell and escalate privileges to access sensitive system functions, though the CVSS 2.4 score reflects the requirement for physical proximity and lack of data availability impact.

Dahua Privilege Escalation Authentication Bypass
NVD VulDB
CVSS 4.0
2.4
EPSS
0.0%
CVE-2026-3784 MEDIUM POC PATCH This Month

curl's HTTP proxy connection reuse mechanism fails to validate credential changes, allowing an attacker to intercept or manipulate traffic by leveraging an existing proxy connection established with different authentication. This affects users whose applications reuse proxy connections across requests with varying credentials, enabling credential confusion attacks. Public exploit code exists for this vulnerability, though a patch is available.

Information Disclosure Curl
NVD VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-1965 MEDIUM PATCH This Month

libcurl incorrectly reuses authenticated connections when processing Negotiate authentication requests, allowing an attacker with valid credentials to access resources authenticated under different user accounts. An authenticated attacker can exploit this connection pooling logic error to bypass authentication checks by reusing an existing connection that was authenticated with different credentials. This affects libcurl implementations using Negotiate authentication where multiple users access the same server.

Information Disclosure Curl Redhat Suse
NVD VulDB
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-3047 HIGH This Week

Keycloak's SAML identity provider broker fails to enforce client disabled status during IdP-initiated SSO flows, allowing attackers with valid credentials to establish authenticated sessions and access other enabled clients without re-authentication. An authenticated remote attacker can exploit this authentication bypass to gain unauthorized access to protected resources across the Keycloak ecosystem. No patch is currently available.

Authentication Bypass
NVD VulDB
CVSS 3.1
8.8
EPSS
0.4%
CVE-2026-28536 CRITICAL Act Now

Auth bypass in device authentication module.

Authentication Bypass Harmonyos
NVD
CVSS 3.1
9.6
EPSS
0.0%
CVE-2026-1713 MEDIUM This Month

Improper use of cryptographic functions in IBM MQ versions 9.1 through 9.4 allows local attackers with user privileges to modify message integrity through user interaction. The vulnerability affects multiple LTS and CD releases across the supported product line, with no patch currently available. An attacker could manipulate messages in transit to alter their content without detection.

IBM Mq
NVD
CVSS 3.1
5.0
EPSS
0.0%
CVE-2026-0869 HIGH This Week

Brocade Active Support Connectivity Gateway versions up to 3.4.0 contains a vulnerability that allows attackers to an unauthorized user to perform ASCG operations related to Brocade Support Link( (CVSS 8.8).

Authentication Bypass Brocade Active Support Connectivity Gateway
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-22153 HIGH This Week

Fortios versions up to 7.6.4 contains a vulnerability that allows attackers to an unauthenticated attacker to bypass LDAP authentication of Agentless VPN or FS (CVSS 8.1).

Fortinet Fortigate Ldap Authentication Bypass Fortios
NVD
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-30849
EPSS 0% CVSS 9.3
CRITICAL PATCH Act Now

MantisBT versions prior to 2.28.1 contain an authentication bypass vulnerability in the SOAP API caused by improper type checking on the password parameter when running on MySQL family databases. An attacker who knows a victim's username can log in to the SOAP API without knowing the correct password and execute any API function available to that account. While a CVE CVSS score is not yet assigned, the vulnerability is patched in version 2.28.1, and disabling the SOAP API reduces but does not eliminate the risk.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-33496
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Ory Oathkeeper contains a cache key confusion vulnerability in its oauth2_introspection authenticator that allows attackers to bypass authentication by reusing tokens across different introspection servers. Attackers with a valid token for one configured introspection server can exploit the cache mechanism to gain unauthorized access to resources protected by different introspection servers. This vulnerability requires the specific precondition of multiple oauth2_introspection authenticators with caching enabled, and a patch is available from the vendor.

Authentication Bypass
NVD GitHub
CVE-2025-31703
EPSS 0% CVSS 2.4
LOW Monitor

This vulnerability in Dahua NVR/XVR devices allows unauthenticated privilege escalation through the serial port console by bypassing shell authentication mechanisms. Affected devices include Dahua NVR2-4KS3, XVR4232AN-I/T, and XVR1B16H-I/T models with build dates prior to March 3, 2026. An attacker with physical access to the device can gain a restricted shell and escalate privileges to access sensitive system functions, though the CVSS 2.4 score reflects the requirement for physical proximity and lack of data availability impact.

Dahua Privilege Escalation Authentication Bypass
NVD VulDB
CVE-2026-3784
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

curl's HTTP proxy connection reuse mechanism fails to validate credential changes, allowing an attacker to intercept or manipulate traffic by leveraging an existing proxy connection established with different authentication. This affects users whose applications reuse proxy connections across requests with varying credentials, enabling credential confusion attacks. Public exploit code exists for this vulnerability, though a patch is available.

Information Disclosure Curl
NVD VulDB
CVE-2026-1965
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

libcurl incorrectly reuses authenticated connections when processing Negotiate authentication requests, allowing an attacker with valid credentials to access resources authenticated under different user accounts. An authenticated attacker can exploit this connection pooling logic error to bypass authentication checks by reusing an existing connection that was authenticated with different credentials. This affects libcurl implementations using Negotiate authentication where multiple users access the same server.

Information Disclosure Curl Redhat +1
NVD VulDB
CVE-2026-3047
EPSS 0% CVSS 8.8
HIGH This Week

Keycloak's SAML identity provider broker fails to enforce client disabled status during IdP-initiated SSO flows, allowing attackers with valid credentials to establish authenticated sessions and access other enabled clients without re-authentication. An authenticated remote attacker can exploit this authentication bypass to gain unauthorized access to protected resources across the Keycloak ecosystem. No patch is currently available.

Authentication Bypass
NVD VulDB
CVE-2026-28536
EPSS 0% CVSS 9.6
CRITICAL Act Now

Auth bypass in device authentication module.

Authentication Bypass Harmonyos
NVD
CVE-2026-1713
EPSS 0% CVSS 5.0
MEDIUM This Month

Improper use of cryptographic functions in IBM MQ versions 9.1 through 9.4 allows local attackers with user privileges to modify message integrity through user interaction. The vulnerability affects multiple LTS and CD releases across the supported product line, with no patch currently available. An attacker could manipulate messages in transit to alter their content without detection.

IBM Mq
NVD
CVE-2026-0869
EPSS 0% CVSS 8.8
HIGH This Week

Brocade Active Support Connectivity Gateway versions up to 3.4.0 contains a vulnerability that allows attackers to an unauthorized user to perform ASCG operations related to Brocade Support Link( (CVSS 8.8).

Authentication Bypass Brocade Active Support Connectivity Gateway
NVD
CVE-2026-22153
EPSS 0% CVSS 8.1
HIGH This Week

Fortios versions up to 7.6.4 contains a vulnerability that allows attackers to an unauthenticated attacker to bypass LDAP authentication of Agentless VPN or FS (CVSS 8.1).

Fortinet Fortigate Ldap +2
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy