Authentication Bypass

7476 CVEs technique

Monthly

CVE-2026-32104 MEDIUM PATCH This Month

A security vulnerability in StudioCMS (CVSS 5.4). Remediation should follow standard vulnerability management procedures.

Authentication Bypass Studiocms
NVD GitHub VulDB
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-32103 MEDIUM PATCH This Month

Medium severity vulnerability in StudioCMS. The POST /studiocms_api/dashboard/create-reset-link endpoint allows any authenticated user with admin privileges to generate a password reset token for any other user, including the owner account. The handler verifies that the caller is an admin but does not enforce role hierarchy, nor does it validate that the target userId matches the caller's identity. Combined with the POST /studiocms_api/d...

Authentication Bypass Studiocms
NVD GitHub VulDB
CVSS 3.1
6.8
EPSS
0.0%
CVE-2026-32102 MEDIUM PATCH This Month

OliveTin’s live EventStream broadcasts execution events and action output to authenticated dashboard subscribers without enforcing per-action authorization. A low-privileged authenticated user can receive output from actions they are not allowed to view, resulting in broken access control and sensitive information disclosure. I validated this on OliveTin 3000.10.2. The issue is in the live event streaming path. EventStream() only checks whether the caller may access the dashboard, then registers the user as a stream subscriber: - service/internal/api/api.go:776 After subscription, execution events are broadcast to all connected clients without checking whether each recipient is authorized to view logs for the action: - service/internal/api/api.go:846 OnExecutionStarted - service/internal/api/api.go:869 OnExecutionFinished - service/internal/api/api.go:1047 OnOutputChunk The event payload includes action output through: - service/internal/api/api.go:295 internalLogEntryToPb - service/internal/api/api.go:302 Output By contrast, the normal log APIs do apply per-action authorization checks: - service/internal/api/api.go:518 GetLogs - service/internal/api/api.go:585 GetActionLogs - service/internal/api/api.go:544 isLogEntryAllowed Root cause: - the subscription path enforces only coarse dashboard access - execution callbacks broadcast to every connected client - no per-recipient ACL check is applied before sending action metadata or output I validated the issue using: - an admin user with full ACLs - an alice user with no ACLs - a protected action that outputs TOPSECRET=alpha-bravo-charlie Despite having no relevant ACLs, alice still receives the ExecutionFinished event for the privileged action, including the protected output. Tested version: ``` - 3000.10.2 ``` 1. Fetch and check out 3000.10.2 in a clean worktree: ```bash git -C OliveTin fetch origin tag 3000.10.2 git -C OliveTin worktree add /home/kali/CVE/OliveTin-3000.10.2 3000.10.2 ``` 2. Copy the PoC test into the clean tree: ```bash cp OliveTin/service/internal/api/event_stream_leak_test.go \ OliveTin-3000.10.2/service/internal/api/ ``` 3. Run the targeted PoC test: ```bash cd OliveTin-3000.10.2/service go test ./internal/api -run TestEventStreamLeaksUnauthorizedExecutionOutput -count=1 -timeout 30s -v ``` 4. Optional: save validation output: ```bash go test ./internal/api -run TestEventStreamLeaksUnauthorizedExecutionOutput -count=1 -timeout 30s -v \ 2>&1 | tee /tmp/olivetin_eventstream_3000.10.2.log ``` Observed validation output: ```bash === RUN TestEventStreamLeaksUnauthorizedExecutionOutput time="2026-03-01T04:44:59-05:00" level=info msg="Action requested" actionTitle=secret-action tags="[]" time="2026-03-01T04:44:59-05:00" level=info msg="Action parse args - Before" actionTitle=secret-action cmd="echo 'TOPSECRET=alpha-bravo-charlie'" time="2026-03-01T04:44:59-05:00" level=info msg="Action parse args - After" actionTitle=secret-action cmd="echo 'TOPSECRET=alpha-bravo-charlie'" time="2026-03-01T04:44:59-05:00" level=info msg="Action started" actionTitle=secret-action timeout=1 time="2026-03-01T04:44:59-05:00" level=info msg="Action finished" actionTitle=secret-action exit=0 outputLength=30 timedOut=false --- PASS: TestEventStreamLeaksUnauthorizedExecutionOutput (0.00s) PASS ok github.com/OliveTin/OliveTin/internal/api 0.025s ``` What this proves: - admin can execute the protected action - alice has no ACLs - alice still receives the streamed completion event for the protected action - protected action output is exposed through the event stream This is an authenticated broken access control / information disclosure vulnerability. A low-privileged authenticated user can subscribe to EventStream and receive: - action execution metadata - execution tracking IDs - initiating username - live output chunks - final command output Who is impacted: - multi-user OliveTin deployments - environments where privileged actions produce secrets, tokens, internal system details, or other sensitive operational output - deployments where lower-privileged authenticated users can access the dashboard and subscribe to live events This bypasses intended per-action log/view restrictions for protected actions.

Information Disclosure Authentication Bypass Olivetin
NVD GitHub VulDB
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-32101 HIGH PATCH This Week

High severity vulnerability in StudioCMS. The S3 storage manager's `isAuthorized()` function is declared `async` (returns `Promise<boolean>`) but is called without `await` in both the POST and PUT handlers. Since a Promise object is always truthy in JavaScript, `!isAuthorized(type)` always evaluates to `false`, completely bypassing the authorization check. Any authenticated user with the lowest `visitor` role can upload, delete, rename...

Authentication Bypass Studiocms
NVD GitHub VulDB
CVSS 3.1
7.6
EPSS
0.0%
CVE-2026-2368 HIGH This Week

Lenovo Filez fails to properly validate SSL/TLS certificates, enabling network-positioned attackers to intercept traffic and execute arbitrary code on affected systems. An attacker with the ability to perform man-in-the-middle attacks can exploit this weakness to compromise user devices without authentication. No patch is currently available to remediate this vulnerability.

Authentication Bypass RCE
NVD VulDB
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-1068 MEDIUM This Month

Lenovo Filez fails to properly validate SSL/TLS certificates, enabling network-positioned attackers to intercept encrypted communications and extract sensitive user information. The vulnerability requires an adjacent network position and specific conditions to exploit, but affects all users of the application. No patch is currently available.

Authentication Bypass
NVD VulDB
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-66956 CRITICAL Act Now

Insecure access control in Asseco SEE Live 2.0. Remote access to attachments.

Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
9.9
EPSS
0.1%
CVE-2026-32097 HIGH This Week

Authenticated users in PingPong versions prior to 7.27.2 can access and delete files beyond their authorization scope, potentially exposing or removing private user files and model outputs. An attacker with valid credentials and thread access can exploit improper access controls to retrieve or delete sensitive data belonging to other users. No patch is currently available for this high-severity vulnerability affecting the AI/ML teaching platform.

Authentication Bypass AI / ML Pingpong
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-31889 HIGH PATCH This Week

Shopware versions before 6.6.10.15 and 6.7.8.1 contain an authentication bypass in the app registration flow that allows attackers to hijack the communication channel between a shop and third-party apps by re-registering with a controlled domain without domain ownership verification. An attacker with knowledge of the app secret can redirect app traffic and intercept API credentials intended for legitimate shops. This vulnerability affects all Shopware installations using the legacy app registration mechanism and currently has no available patch.

Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
8.9
EPSS
0.1%
CVE-2026-27478 CRITICAL Act Now

Auth bypass in Unity Catalog 0.4.0 and earlier.

Authentication Bypass AI / ML
NVD GitHub VulDB
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-31887 PATCH This Week

Shopware is an open commerce platform. versions up to 6.7.8.1 is affected by incorrect authorization.

Authentication Bypass
NVD GitHub VulDB
EPSS
0.0%
CVE-2026-31881 HIGH This Week

Runtipi versions prior to 4.8.0 allow unauthenticated attackers to reset the admin password through an unprotected POST /api/auth/reset-password endpoint, enabling complete account takeover during active password-reset windows. Any remote user can set a new operator password within the 15-minute reset window without authentication or authorization checks. This vulnerability remains unpatched in affected versions.

Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
7.7
EPSS
0.1%
CVE-2026-31874 CRITICAL Act Now

Missing auth in Taskosaur project management 1.0.0.

Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
9.8
EPSS
0.1%
CVE-2019-25486 HIGH POC This Week

Varient 1.6.1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the user_id parameter. [CVSS 8.2 HIGH]

SQLi Authentication Bypass
NVD Exploit-DB VulDB
CVSS 3.1
8.2
EPSS
0.2%
CVE-2019-25483 HIGH POC This Week

Comtrend AR-5310 GE31-412SSG-C01_R10.A2pG039u.d24k contains a restricted shell escape vulnerability that allows local users to bypass command restrictions by using the command substitution operator $( ). [CVSS 8.4 HIGH]

Authentication Bypass
NVD Exploit-DB VulDB
CVSS 3.1
8.4
EPSS
0.0%
CVE-2019-25470 HIGH POC This Week

eWON Firmware versions 12.2 to 13.0 contain an authentication bypass vulnerability that allows attackers with minimal privileges to retrieve sensitive user data by exploiting the wsdReadForm endpoint. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB VulDB
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-31872 HIGH PATCH This Week

Parse Server versions prior to 9.6.0-alpha.6 and 8.6.32 allow attackers to bypass class-level permission restrictions on protected fields by using dot-notation in query and sort parameters, enabling enumeration of sensitive field values through binary oracle attacks. This affects both MongoDB and PostgreSQL deployments and requires no authentication or user interaction. No patch is currently available for affected versions.

Node.js PostgreSQL Authentication Bypass Parse Server
NVD GitHub VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-31867 MEDIUM PATCH This Month

Craft Commerce versions prior to 4.11.0 and 5.6.0 contain an IDOR vulnerability in the cart functionality that allows unauthenticated attackers to access and modify arbitrary shopping carts by guessing or knowing their 32-character identifiers. The CartController fails to validate cart ownership, enabling attackers to hijack active shopping sessions and potentially access sensitive customer information. No patch is currently available for affected versions.

Authentication Bypass Craft Commerce
NVD GitHub VulDB
CVSS 3.1
4.8
EPSS
0.0%
CVE-2026-31863 LOW PATCH Monitor

Anytype Heart is the middleware library for Anytype. The challenge-based authentication for the local gRPC client API can be bypassed, allowing an attacker to gain access without the 4-digit code. [CVSS 3.6 LOW]

Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
3.6
EPSS
0.0%
CVE-2026-3429 MEDIUM This Month

Keycloak's Account REST API improperly validates session assurance levels, enabling authenticated attackers with a victim's password to remove MFA/OTP credentials without re-authentication and subsequently register their own authenticator. This allows complete account takeover by bypassing the intended multi-factor authentication protections. The vulnerability affects users relying on MFA as a security control and currently has no available patch.

Authentication Bypass
NVD VulDB
CVSS 3.1
4.2
EPSS
0.0%
CVE-2026-31839 HIGH PATCH This Week

Striae versions prior to 3.0.0 allow local attackers to bypass package integrity verification by modifying both the manifest hash and package contents simultaneously, enabling delivery of tampered firearm examination data that passes validation checks. This integrity bypass affects forensic workflows relying on Striae's digital confirmation mechanism. No patch is currently available for affected installations.

Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
8.2
EPSS
0.0%
CVE-2026-31813 MEDIUM This Month

Supabase Auth allows remote attackers to hijack user sessions by crafting fraudulent ID tokens when Apple or Azure OAuth providers are configured, enabling unauthorized access to victim accounts without requiring user interaction. An attacker can forge a valid JWT token for any target email address and exchange it at the token endpoint to obtain legitimate session credentials, effectively impersonating arbitrary users. This affects organizations using Supabase with Apple or Azure authentication enabled, with no patch currently available to remediate the vulnerability.

Microsoft Authentication Bypass Apple
NVD GitHub VulDB
CVSS 3.1
4.8
EPSS
0.0%
CVE-2026-30239 MEDIUM This Month

Unauthorized budget assignment deletion in OpenProject prior to 17.2.0 allows any authenticated user to remove work package budget associations due to insufficient authorization checks being performed after the deletion operation. This improper access control enables users without proper permissions to manipulate budget data, potentially disrupting project financial tracking and resource allocation. A patch is available in version 17.2.0 and later.

Authentication Bypass Openproject
NVD GitHub VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-30236 MEDIUM This Month

OpenProject prior to 17.2.0 fails to validate project membership when calculating labor costs in budget planning, allowing authenticated users to enumerate non-member employees' default billing rates. This exposure occurs both when editing budgets directly and through the cost preview calculation endpoint, potentially revealing sensitive salary information to unauthorized project users.

Authentication Bypass Openproject
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-1524 This Week

An edgecase in SSO implementation in Neo4j Enterprise edition versions prior to version 2026.02 can lead to unauthorised access under the following conditions: If a neo4j admin configures two or more OIDC providers AND configures one or more of them to be an authorization provider AND configures one or more of them to be authentication-only, then those that are authentication-only will also provide authorization. This edgecase becomes a security problem only if the authentication-only provi...

Authentication Bypass
NVD VulDB
EPSS
0.0%
CVE-2026-1471 This Week

Excessive caching of authentication context in Neo4j Enterprise edition versions up to 2026.01.4 is affected by incorrect authorization.

Authentication Bypass
NVD VulDB
EPSS
0.0%
CVE-2025-67039 CRITICAL Act Now

Critical vulnerability in Lantronix EDS serial device server (EDS5000/EDS3000PS). Multiple injection and auth bypass vulnerabilities in the management interface.

Authentication Bypass
NVD VulDB
CVSS 3.1
9.1
EPSS
0.0%
CVE-2025-12555 MEDIUM This Month

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.1 versions up to 18.7.6 is affected by incorrect authorization (CVSS 4.3).

Gitlab Authentication Bypass
NVD VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-31892 HIGH PATCH This Week

Argo Workflows versions 2.9.0 through 4.0.1 (and 3.x before 3.7.11) allow authenticated users to bypass WorkflowTemplate security policies by injecting a podSpecPatch field in workflow submissions, circumventing even strict template referencing controls. An attacker with workflow submission privileges can exploit this to modify pod specifications without security validation, potentially gaining unauthorized access or executing arbitrary code. This vulnerability affects organizations using Kubernetes with Argo Workflows and requires upgrading to versions 4.0.2, 3.7.11 or later to remediate.

Kubernetes Authentication Bypass Argo Workflows
NVD GitHub VulDB
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-29777 PATCH Monitor

Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A tenant with write access to an HTTPRoute resource can inject backtick-delimited rule tokens into Traefik's router rule language via unsanitized header or query parameter match values. In shared gateway deployments, this can bypass listener hostname constraints and redirect traffic for victim hostnames to attacker-controlled ...

Authentication Bypass
NVD GitHub VulDB
EPSS
0.0%
CVE-2026-28803 MEDIUM This Month

Open Forms versions prior to 3.3.13 and 3.4.5 allow authenticated attackers to access arbitrary form submissions through submission reference enumeration or manipulation in the cosigning workflow. An attacker with valid credentials can guess or modify cosigner codes to retrieve submissions they should not have access to, resulting in unauthorized information disclosure.

Authentication Bypass Open Forms
NVD GitHub VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-28229 CRITICAL PATCH Act Now

Auth bypass in Argo Workflows before 4.0.2/3.7.11.

Kubernetes Authentication Bypass Redhat Suse
NVD GitHub VulDB
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-1663 MEDIUM This Month

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 14.4 versions up to 18.7.6 is affected by missing authorization (CVSS 4.3).

Gitlab Authentication Bypass
NVD VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-1497 This Week

Incorrect resolving of namespaces in composite databases in Neo4j Enterprise edition versions up to 2026.02 is affected by incorrect authorization.

Authentication Bypass
NVD VulDB
EPSS
0.0%
CVE-2025-12704 LOW Monitor

GitLab has remediated an issue in GitLab EE affecting all versions from 18.2 versions up to 18.7.6 is affected by missing authorization (CVSS 3.5).

Gitlab Authentication Bypass
NVD VulDB
CVSS 3.1
3.5
EPSS
0.0%
CVE-2026-32229 MEDIUM This Month

JetBrains Hub versions prior to 2026.1 contain an authentication bypass vulnerability where attackers with valid credentials can gain unauthorized access to accounts through sign-in mismatches when SSO is disabled and two-factor authentication is not configured. An authenticated attacker can exploit this to achieve both confidentiality and integrity violations. No patch is currently available for this vulnerability.

Authentication Bypass
NVD VulDB
CVSS 3.1
6.8
EPSS
0.0%
CVE-2025-67298 HIGH This Week

An issue in ClasroomIO before v.0.2.6 allows a remote attacker to escalate privileges via the endpoints /api/verify and /rest/v1/profile [CVSS 8.1 HIGH]

Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
8.1
EPSS
0.1%
CVE-2026-32059 HIGH PATCH This Week

OpenClaw version 2026.2.22-2 versions up to 2026.2.23 is affected by incorrect authorization (CVSS 8.8).

Authentication Bypass Openclaw
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-27842 CRITICAL Act Now

Auth bypass in MR-GM5L-S1/MR-GM5A-L1 devices.

Authentication Bypass
NVD
CVSS 3.0
9.8
EPSS
0.1%
CVE-2026-24448 CRITICAL Act Now

Hardcoded credentials in MR-GM5L-S1/MR-GM5A-L1 devices.

Authentication Bypass
NVD
CVSS 3.0
9.8
EPSS
0.0%
CVE-2026-29515 Monitor

embedded SwiFTP FTP server component contains a vulnerability that allows attackers to log in without valid credentials.

Authentication Bypass
NVD GitHub
EPSS
0.1%
CVE-2026-23813 CRITICAL Act Now

Auth bypass in HPE Aruba AOS-CX switch web management.

Authentication Bypass
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-31838 MEDIUM This Month

Istio versions prior to 1.29.1, 1.28.5, and 1.27.8 are vulnerable to authorization policy bypass through improper Envoy RBAC handling of multi-valued HTTP headers. An attacker can craft requests with multiple header values that cause the authorization engine to evaluate headers differently than intended, allowing unauthorized access to protected microservices. No patch is currently available for this vulnerability.

Authentication Bypass
NVD GitHub VulDB
CVSS 4.0
6.9
EPSS
0.0%
CVE-2026-31832 MEDIUM PATCH This Month

Umbraco CMS versions 14.0.0 through 16.5.0 and 17.0.0-17.2.1 contain an authorization bypass in a backoffice API endpoint that allows authenticated editors to assign domain configurations to content nodes they lack permission to access. An attacker with valid credentials could exploit this to modify domain settings on restricted content, potentially affecting content visibility or routing. The vulnerability affects Umbraco deployments without patches 16.5.1 or 17.2.2 applied.

Authentication Bypass Umbraco Cms
NVD GitHub VulDB
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-31821 MEDIUM PATCH This Month

Sylius eCommerce framework's cart API endpoint fails to validate cart ownership, allowing unauthenticated attackers to add items to other customers' shopping carts if they possess a valid cart token value. This integrity flaw affects registered users whose carts can be manipulated by external threat actors, potentially leading to fraudulent transactions or operational disruption. The vulnerability is unpatched in versions prior to 2.0.16, 2.1.12, and 2.2.3.

Authentication Bypass Sylius
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-31820 MEDIUM PATCH This Month

Authenticated users in Sylius eCommerce can access sensitive customer data belonging to other users through unvalidated resource IDs in LiveComponent parameters, including checkout addresses and shopping carts. The vulnerability exists because LiveArg parameters lack ownership validation when loading resources by ID, allowing attackers to enumerate and retrieve private information such as names, contact details, and order information without proper authorization checks.

Authentication Bypass Sylius
NVD GitHub VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-31815 MEDIUM PATCH This Month

Unicorn adds modern reactive component functionality to your Django templates. versions up to 0.67.0 is affected by improper access control (CVSS 5.3).

Python Authentication Bypass Unicorn
NVD GitHub VulDB
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-28806 CRITICAL Act Now

Improper Authorization vulnerability in nerves-hub nerves_hub_web allows cross-organization device control via device bulk actions and device update API.

Authentication Bypass
NVD GitHub VulDB
CVSS 4.0
9.4
EPSS
0.0%
CVE-2026-31801 HIGH PATCH This Week

Zot registry versions 1.3.0 through 2.1.14 have an authorization bypass in the manifest upload endpoint that allows authenticated users with only create permissions to overwrite the latest tag when it already exists. An attacker with limited write privileges can leverage this flaw to replace the latest image version, potentially distributing malicious container images to downstream consumers. The vulnerability is fixed in version 2.1.15.

Authentication Bypass Zot
NVD GitHub VulDB
CVSS 3.1
7.7
EPSS
0.0%
CVE-2026-30954 MEDIUM This Month

LinkAce versions 2.1.0 and earlier allow authenticated users to inappropriately associate other users' private taxonomies with their own links through insufficient authorization checks in the processTaxonomy() method. This enables privilege escalation where attackers can gain unauthorized access to private tags and lists belonging to other users on the same instance. The vulnerability requires valid authentication credentials and has no available patch at this time.

PHP Authentication Bypass Linkace
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-70802 HIGH This Week

Tenda G1V3.1si V16.01.7.8 Firmware V16.01.7.8 was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root. [CVSS 8.4 HIGH]

Authentication Bypass Tenda
NVD GitHub VulDB
CVSS 3.1
8.4
EPSS
0.0%
CVE-2025-70798 HIGH This Week

Tenda i24V3.0si V3.0.0.5 Firmware V3.0.0.5 was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root. [CVSS 8.4 HIGH]

Authentication Bypass Tenda
NVD GitHub VulDB
CVSS 3.1
8.4
EPSS
0.0%
CVE-2026-29792 PATCH This Week

Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. From 5.0.0 to before 5.0.42, an unauthenticated attacker can send a crafted GET request directly to /oauth/:provider/callback with a forged profile in the query string. The OAuth service's authentication payload has a fallback chain that reaches params.query (the raw request query) when Gra...

Authentication Bypass
NVD GitHub VulDB
EPSS
0.0%
CVE-2026-26308 HIGH POC PATCH This Week

Envoy's RBAC filter improperly concatenates duplicate HTTP headers into comma-separated strings instead of validating each value individually, allowing attackers to bypass "Deny" access control policies through header manipulation. This vulnerability affects Envoy versions prior to 1.34.13, 1.35.8, 1.36.5, and 1.37.1, and public exploit code exists. Patches are available for all affected versions.

Authentication Bypass Envoy
NVD GitHub VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-26742 HIGH POC This Week

PX4 Autopilot versions 1.12.x through 1.15.x can be forced into an unsafe re-arm state when pilots switch to Manual mode and re-arm within 5 seconds of landing, bypassing critical pre-flight safety checks and throttle validation. This allows attackers or malicious pilots to trigger immediate high-thrust takeoff, resulting in loss of aircraft control. Public exploit code exists for this vulnerability and no patch is currently available.

Authentication Bypass Px4 Drone Autopilot
NVD GitHub VulDB
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-26741 HIGH POC This Week

PX4 Autopilot versions 1.12.x through 1.15.x contain a logic flaw in the mode switching mechanism. [CVSS 8.1 HIGH]

Authentication Bypass Px4 Drone Autopilot
NVD GitHub VulDB
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-30970 CRITICAL Act Now

Coral Server has a third missing authorization flaw.

Authentication Bypass AI / ML Coral Server
NVD GitHub VulDB
CVSS 3.1
9.1
EPSS
0.1%
CVE-2026-30969 CRITICAL Act Now

Coral Server has an IDOR vulnerability enabling cross-user data access.

Authentication Bypass AI / ML Coral Server
NVD GitHub VulDB
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-30968 CRITICAL Act Now

Coral Server open collaboration platform has a missing authorization enabling unauthenticated access to all collaboration data.

Authentication Bypass AI / ML Coral Server
NVD GitHub VulDB
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-30956 CRITICAL POC PATCH Act Now

OneUptime prior to 10.0.21 has a third authorization bypass enabling low-privileged users to access admin functions.

Authentication Bypass Privilege Escalation Information Disclosure Node.js Oneuptime
NVD GitHub VulDB
CVSS 3.1
9.9
EPSS
0.0%
CVE-2026-30945 HIGH PATCH This Week

StudioCMS prior to version 0.4.0 allows authenticated editors and above to revoke API tokens belonging to any user, including administrators and owners, due to insufficient authorization checks on the DELETE /studiocms_api/dashboard/api-tokens endpoint. An attacker with editor privileges can exploit this to disable critical integrations and automations by revoking tokens of higher-privileged accounts. No patch is currently available for affected versions.

Denial Of Service Authentication Bypass Studiocms
NVD GitHub VulDB
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-30944 HIGH PATCH This Week

Privilege escalation in StudioCMS versions prior to 0.4.0 enables authenticated Editor-level users to generate API tokens for arbitrary accounts, including administrative and owner roles, due to missing authorization validation on the /studiocms_api/dashboard/api-tokens endpoint. An attacker with basic editor privileges can exploit this to gain full administrative access without requiring the target account's credentials. No patch is currently available for affected installations.

Privilege Escalation Authentication Bypass Studiocms
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-2742 PATCH Monitor

Authentication bypass in Vaadin framework (14.0.0-14.14.0, 23.0.0-23.6.x, and other ranges). The web application framework fails to properly enforce authentication on certain routes.

Spring Authentication Bypass
NVD GitHub VulDB
EPSS
0.3%
CVE-2026-2339 HIGH This Week

TUBITAK BILGEM Software Technologies Research Institute Liderahenk is affected by missing authentication for critical function (CVSS 7.5).

Command Injection Authentication Bypass
NVD VulDB
CVSS 3.1
7.5
EPSS
0.2%
CVE-2026-26148 HIGH This Week

Local privilege escalation in Azure Entra ID SSH Login Extension for Linux stems from improper initialization of trusted variables, enabling unauthenticated attackers on affected systems to gain elevated privileges. This high-severity vulnerability (CVSS 8.1) requires local access but can compromise system confidentiality, integrity, and availability across trust boundaries. No patch is currently available.

Authentication Bypass Microsoft Azure Ad Ssh Login Extension For Linux
NVD VulDB
CVSS 3.1
8.1
EPSS
0.1%
CVE-2026-26141 HIGH This Week

Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally. [CVSS 7.8 HIGH]

Authentication Bypass Microsoft Azure Automation Hybrid Worker Windows Extension
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-26128 HIGH This Week

Windows SMB Server's authentication mechanism can be bypassed by local authenticated users to gain elevated privileges on affected systems. This high-severity vulnerability (CVSS 7.8) impacts confidentiality, integrity, and availability, though no patch is currently available. Organizations should implement compensating controls and monitor for exploitation attempts targeting this authentication weakness.

Microsoft Authentication Bypass Windows
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-26117 HIGH This Week

Privilege escalation in Microsoft Azure Connected Machine Agent on Windows allows local authenticated users to bypass authentication mechanisms and gain elevated system privileges. An attacker with existing local access can exploit alternate authentication paths to escalate their permissions without user interaction. No patch is currently available for this vulnerability affecting Arc Enabled Servers.

Authentication Bypass Microsoft Arc Enabled Servers Azure Connected Machine Agent Windows
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-26113 HIGH This Week

Unsafe pointer dereference in Microsoft Office, SharePoint Server, and 365 Apps enables local code execution with high privileges on affected systems. An attacker with local access can exploit this memory safety flaw to achieve complete system compromise including data theft and modification. No patch is currently available, leaving users vulnerable until Microsoft releases a security update.

Microsoft Authentication Bypass Sharepoint Server Office Office Long Term Servicing Channel +1
NVD VulDB
CVSS 3.1
8.4
EPSS
0.0%
CVE-2026-26112 HIGH This Week

Microsoft Excel and Office products are vulnerable to local code execution through unsafe pointer dereferencing, requiring user interaction to trigger. An attacker with local access can exploit this flaw to achieve arbitrary code execution with full system privileges. No patch is currently available, leaving users of affected Office versions at risk.

Microsoft Authentication Bypass Office Online Server Excel Office +2
NVD VulDB
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-26110 HIGH This Week

Local code execution in Microsoft Office and 365 Apps stems from a type confusion vulnerability in memory handling that allows unauthenticated attackers to execute arbitrary code with system privileges. The vulnerability affects Office Long Term Servicing Channel deployments and requires only local access with no user interaction to trigger. No patch is currently available, making this a critical risk for organizations running affected Office versions.

Microsoft Authentication Bypass Memory Corruption Office 365 Apps +1
NVD VulDB
CVSS 3.1
8.4
EPSS
0.1%
CVE-2026-25190 HIGH This Week

Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally. [CVSS 7.8 HIGH]

Authentication Bypass Microsoft Windows Server 2022 23h2 Windows Server 2022 Windows 11 26h1 +12
NVD VulDB
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-25176 HIGH This Week

Windows Ancillary Function Driver for WinSock in Windows 10 (all versions) and Windows 11 contains an access control weakness that enables authenticated local attackers to escalate privileges to system level. An attacker with standard user credentials can exploit this flaw to gain elevated rights on affected systems. No patch is currently available for this vulnerability.

Authentication Bypass Microsoft Windows 10 22h2 Windows 10 1607 Windows Server 2019 +12
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-25169 MEDIUM This Month

A division by zero flaw in the Microsoft Graphics Component on Windows 10 and Windows 11 systems enables local attackers to trigger a denial of service condition without requiring special privileges or user interaction. The vulnerability affects multiple Windows versions including Windows 10 1607, 22h2 and Windows 11 25h2, 26h1, with no patch currently available.

Microsoft Authentication Bypass Windows 10 1607 Windows 11 25h2 Windows 11 26h1 +11
NVD VulDB
CVSS 3.1
6.2
EPSS
0.0%
CVE-2026-24297 MEDIUM This Month

Windows Kerberos authentication in Server 2012 and Windows 10 (versions 1607, 1809) contains a race condition that enables unauthenticated remote attackers to circumvent security feature protections. The synchronization flaw in concurrent resource access allows attackers to bypass intended security controls without user interaction over the network. No patch is currently available for this vulnerability.

Race Condition Microsoft Authentication Bypass Windows Server 2012 Windows 10 1607 +6
NVD VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-24294 HIGH This Week

Windows SMB Server authentication bypass across multiple versions (Windows 10 1607, Windows 11 23h2, Windows Server 2012/2025) permits authenticated local users to escalate privileges with high impact to confidentiality, integrity, and availability. The vulnerability stems from improper authentication validation in the SMB service, allowing a local attacker to gain system-level access without user interaction. No patch is currently available, leaving affected systems vulnerable to privilege escalation attacks from any authenticated user.

Microsoft Authentication Bypass Windows
NVD VulDB
CVSS 3.1
7.8
EPSS
0.1%
CVE-2026-24290 HIGH This Week

Windows Projected File System in Windows 11 and Server 2022 contains improper access control that enables authenticated local users to escalate privileges to system level. An attacker with valid credentials can exploit this vulnerability to gain elevated permissions without user interaction. Currently, no patch is available to address this issue.

Microsoft Authentication Bypass Windows 11 24h2 Windows Server 2022 23h2 Windows 11 26h1 +9
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-23674 HIGH This Week

Windows MapUrlToZone security bypass in Windows 11 24H2, Windows 10 21H2, and Windows Server 2016/2025 allows unauthenticated remote attackers to circumvent zone-based security restrictions through improper path equivalence resolution. An attacker can exploit this network-accessible vulnerability without user interaction to bypass intended access controls. No patch is currently available for this high-severity vulnerability.

Microsoft Authentication Bypass Windows 11 24h2 Windows 10 21h2 Windows Server 2025 +12
NVD VulDB
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-23660 HIGH This Week

Windows Admin Center in Azure Portal contains an access control flaw that enables local authenticated users to escalate their privileges. An attacker with valid credentials can exploit this vulnerability to gain elevated permissions on the system. No patch is currently available for this issue.

Authentication Bypass Microsoft Windows Admin Center Windows
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-23654 HIGH This Week

Remote code execution in the zero-shot-scfoundation AI/ML framework results from a vulnerable third-party dependency, enabling unauthenticated attackers to execute arbitrary code over the network with minimal user interaction. This high-severity vulnerability affects systems using the affected component, and no patch is currently available.

Authentication Bypass AI / ML Zero Shot Scfoundation
NVD VulDB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-22629 LOW Monitor

An improper restriction of excessive authentication attempts vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4 all versions, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer 6.4 all versions, FortiAnalyzer Cloud 7.6.0 through 7.6.4, FortiAnalyzer Cloud 7.4 all versions, FortiAnalyzer Cloud 7.2 all versions, FortiAnalyzer Cloud 7.0 all versions, FortiAnalyzer Cloud 6.4 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4 all...

Fortinet Authentication Bypass
NVD VulDB
CVSS 3.1
3.7
EPSS
0.0%
CVE-2026-22628 MEDIUM This Month

Fortinet FortiSwitchAXFixed versions 1.0.0 through 1.0.1 contain an access control flaw that allows authenticated administrators to execute arbitrary system commands by uploading a malicious SSH configuration file. The vulnerability requires local access and valid admin credentials but poses a risk to organizations where admin accounts may be compromised or where insider threats are a concern. No patch is currently available.

Fortinet Authentication Bypass
NVD VulDB
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-22572 HIGH This Week

MFA bypass in Fortinet FortiManager and FortiAnalyzer 7.2.2-7.6.3 allows attackers with valid admin credentials to disable multifactor authentication through specially crafted repeated requests. This authentication bypass (CWE-288) affects multiple product lines including FortiManager Cloud, creating high risk for unauthorized administrative access. No patch is currently available, leaving affected systems vulnerable to MFA circumvention attacks.

Fortinet Authentication Bypass Fortimanager Fortianalyzer Fortimanager Cloud
NVD VulDB
CVSS 3.1
7.2
EPSS
0.1%
CVE-2026-21262 HIGH POC This Week

SQL Server 2016-2025 contains an improper access control flaw that allows authenticated network attackers to escalate privileges without user interaction. Public exploit code exists for this vulnerability, which carries a CVSS score of 8.8 and affects confidentiality, integrity, and availability. No patch is currently available.

Authentication Bypass Sql Server 2019 Sql Server 2022 Sql Server 2017 Sql Server 2016 +1
NVD VulDB GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-69615 CRITICAL Act Now

A product has missing 2FA rate limiting allowing unlimited brute-force attempts against two-factor authentication codes.

Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
9.1
EPSS
0.0%
CVE-2025-69614 CRITICAL Act Now

A product has an access control flaw allowing activation token reuse on the password-reset endpoint for unauthorized account takeover.

Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
9.4
EPSS
0.0%
CVE-2025-48840 MEDIUM This Month

An authentication bypass by spoofing vulnerability in Fortinet FortiWeb 7.6.0 through 7.6.3, FortiWeb 7.4.0 through 7.4.8, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow a remote unauthenticated attacker to bypass hostname restrictions via a specially crafted request. [CVSS 5.3 MEDIUM]

Fortinet Authentication Bypass Fortiweb
NVD VulDB
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-41710 MEDIUM This Month

An unauthenticated remote attacker may use hardcodes credentials to get access to the previously activated FTP Server with limited read and write privileges. [CVSS 6.5 MEDIUM]

Authentication Bypass
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-27769 LOW CISA Monitor

A vulnerability has been identified in Heliox Flex 180 kW EV Charging Station (All versions < F4.11.1), Heliox Mobile DC 40 kW EV Charging Station (All versions < L4.10.1). [CVSS 2.6 LOW]

Authentication Bypass
NVD
CVSS 3.1
2.6
EPSS
0.0%
CVE-2026-30927 MEDIUM PATCH This Month

Unauthorized event participation manipulation in Admidio prior to 5.0.6 allows authenticated users to register or cancel participation for other users by manipulating the user_uuid parameter in event functions. Any user with event participation privileges can exploit this to modify another user's event enrollment status without authorization. The vulnerability requires authentication and affects confidentiality through unauthorized modifications.

PHP Authentication Bypass Admidio
NVD GitHub VulDB
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-32104
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

A security vulnerability in StudioCMS (CVSS 5.4). Remediation should follow standard vulnerability management procedures.

Authentication Bypass Studiocms
NVD GitHub VulDB
CVE-2026-32103
EPSS 0% CVSS 6.8
MEDIUM PATCH This Month

Medium severity vulnerability in StudioCMS. The POST /studiocms_api/dashboard/create-reset-link endpoint allows any authenticated user with admin privileges to generate a password reset token for any other user, including the owner account. The handler verifies that the caller is an admin but does not enforce role hierarchy, nor does it validate that the target userId matches the caller's identity. Combined with the POST /studiocms_api/d...

Authentication Bypass Studiocms
NVD GitHub VulDB
CVE-2026-32102
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

OliveTin’s live EventStream broadcasts execution events and action output to authenticated dashboard subscribers without enforcing per-action authorization. A low-privileged authenticated user can receive output from actions they are not allowed to view, resulting in broken access control and sensitive information disclosure. I validated this on OliveTin 3000.10.2. The issue is in the live event streaming path. EventStream() only checks whether the caller may access the dashboard, then registers the user as a stream subscriber: - service/internal/api/api.go:776 After subscription, execution events are broadcast to all connected clients without checking whether each recipient is authorized to view logs for the action: - service/internal/api/api.go:846 OnExecutionStarted - service/internal/api/api.go:869 OnExecutionFinished - service/internal/api/api.go:1047 OnOutputChunk The event payload includes action output through: - service/internal/api/api.go:295 internalLogEntryToPb - service/internal/api/api.go:302 Output By contrast, the normal log APIs do apply per-action authorization checks: - service/internal/api/api.go:518 GetLogs - service/internal/api/api.go:585 GetActionLogs - service/internal/api/api.go:544 isLogEntryAllowed Root cause: - the subscription path enforces only coarse dashboard access - execution callbacks broadcast to every connected client - no per-recipient ACL check is applied before sending action metadata or output I validated the issue using: - an admin user with full ACLs - an alice user with no ACLs - a protected action that outputs TOPSECRET=alpha-bravo-charlie Despite having no relevant ACLs, alice still receives the ExecutionFinished event for the privileged action, including the protected output. Tested version: ``` - 3000.10.2 ``` 1. Fetch and check out 3000.10.2 in a clean worktree: ```bash git -C OliveTin fetch origin tag 3000.10.2 git -C OliveTin worktree add /home/kali/CVE/OliveTin-3000.10.2 3000.10.2 ``` 2. Copy the PoC test into the clean tree: ```bash cp OliveTin/service/internal/api/event_stream_leak_test.go \ OliveTin-3000.10.2/service/internal/api/ ``` 3. Run the targeted PoC test: ```bash cd OliveTin-3000.10.2/service go test ./internal/api -run TestEventStreamLeaksUnauthorizedExecutionOutput -count=1 -timeout 30s -v ``` 4. Optional: save validation output: ```bash go test ./internal/api -run TestEventStreamLeaksUnauthorizedExecutionOutput -count=1 -timeout 30s -v \ 2>&1 | tee /tmp/olivetin_eventstream_3000.10.2.log ``` Observed validation output: ```bash === RUN TestEventStreamLeaksUnauthorizedExecutionOutput time="2026-03-01T04:44:59-05:00" level=info msg="Action requested" actionTitle=secret-action tags="[]" time="2026-03-01T04:44:59-05:00" level=info msg="Action parse args - Before" actionTitle=secret-action cmd="echo 'TOPSECRET=alpha-bravo-charlie'" time="2026-03-01T04:44:59-05:00" level=info msg="Action parse args - After" actionTitle=secret-action cmd="echo 'TOPSECRET=alpha-bravo-charlie'" time="2026-03-01T04:44:59-05:00" level=info msg="Action started" actionTitle=secret-action timeout=1 time="2026-03-01T04:44:59-05:00" level=info msg="Action finished" actionTitle=secret-action exit=0 outputLength=30 timedOut=false --- PASS: TestEventStreamLeaksUnauthorizedExecutionOutput (0.00s) PASS ok github.com/OliveTin/OliveTin/internal/api 0.025s ``` What this proves: - admin can execute the protected action - alice has no ACLs - alice still receives the streamed completion event for the protected action - protected action output is exposed through the event stream This is an authenticated broken access control / information disclosure vulnerability. A low-privileged authenticated user can subscribe to EventStream and receive: - action execution metadata - execution tracking IDs - initiating username - live output chunks - final command output Who is impacted: - multi-user OliveTin deployments - environments where privileged actions produce secrets, tokens, internal system details, or other sensitive operational output - deployments where lower-privileged authenticated users can access the dashboard and subscribe to live events This bypasses intended per-action log/view restrictions for protected actions.

Information Disclosure Authentication Bypass Olivetin
NVD GitHub VulDB
CVE-2026-32101
EPSS 0% CVSS 7.6
HIGH PATCH This Week

High severity vulnerability in StudioCMS. The S3 storage manager's `isAuthorized()` function is declared `async` (returns `Promise<boolean>`) but is called without `await` in both the POST and PUT handlers. Since a Promise object is always truthy in JavaScript, `!isAuthorized(type)` always evaluates to `false`, completely bypassing the authorization check. Any authenticated user with the lowest `visitor` role can upload, delete, rename...

Authentication Bypass Studiocms
NVD GitHub VulDB
CVE-2026-2368
EPSS 0% CVSS 7.1
HIGH This Week

Lenovo Filez fails to properly validate SSL/TLS certificates, enabling network-positioned attackers to intercept traffic and execute arbitrary code on affected systems. An attacker with the ability to perform man-in-the-middle attacks can exploit this weakness to compromise user devices without authentication. No patch is currently available to remediate this vulnerability.

Authentication Bypass RCE
NVD VulDB
CVE-2026-1068
EPSS 0% CVSS 5.3
MEDIUM This Month

Lenovo Filez fails to properly validate SSL/TLS certificates, enabling network-positioned attackers to intercept encrypted communications and extract sensitive user information. The vulnerability requires an adjacent network position and specific conditions to exploit, but affects all users of the application. No patch is currently available.

Authentication Bypass
NVD VulDB
CVE-2025-66956
EPSS 0% CVSS 9.9
CRITICAL Act Now

Insecure access control in Asseco SEE Live 2.0. Remote access to attachments.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-32097
EPSS 0% CVSS 8.8
HIGH This Week

Authenticated users in PingPong versions prior to 7.27.2 can access and delete files beyond their authorization scope, potentially exposing or removing private user files and model outputs. An attacker with valid credentials and thread access can exploit improper access controls to retrieve or delete sensitive data belonging to other users. No patch is currently available for this high-severity vulnerability affecting the AI/ML teaching platform.

Authentication Bypass AI / ML Pingpong
NVD GitHub VulDB
CVE-2026-31889
EPSS 0% CVSS 8.9
HIGH PATCH This Week

Shopware versions before 6.6.10.15 and 6.7.8.1 contain an authentication bypass in the app registration flow that allows attackers to hijack the communication channel between a shop and third-party apps by re-registering with a controlled domain without domain ownership verification. An attacker with knowledge of the app secret can redirect app traffic and intercept API credentials intended for legitimate shops. This vulnerability affects all Shopware installations using the legacy app registration mechanism and currently has no available patch.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-27478
EPSS 0% CVSS 9.1
CRITICAL Act Now

Auth bypass in Unity Catalog 0.4.0 and earlier.

Authentication Bypass AI / ML
NVD GitHub VulDB
CVE-2026-31887
EPSS 0%
PATCH This Week

Shopware is an open commerce platform. versions up to 6.7.8.1 is affected by incorrect authorization.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-31881
EPSS 0% CVSS 7.7
HIGH This Week

Runtipi versions prior to 4.8.0 allow unauthenticated attackers to reset the admin password through an unprotected POST /api/auth/reset-password endpoint, enabling complete account takeover during active password-reset windows. Any remote user can set a new operator password within the 15-minute reset window without authentication or authorization checks. This vulnerability remains unpatched in affected versions.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-31874
EPSS 0% CVSS 9.8
CRITICAL Act Now

Missing auth in Taskosaur project management 1.0.0.

Authentication Bypass
NVD GitHub VulDB
CVE-2019-25486
EPSS 0% CVSS 8.2
HIGH POC This Week

Varient 1.6.1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the user_id parameter. [CVSS 8.2 HIGH]

SQLi Authentication Bypass
NVD Exploit-DB VulDB
CVE-2019-25483
EPSS 0% CVSS 8.4
HIGH POC This Week

Comtrend AR-5310 GE31-412SSG-C01_R10.A2pG039u.d24k contains a restricted shell escape vulnerability that allows local users to bypass command restrictions by using the command substitution operator $( ). [CVSS 8.4 HIGH]

Authentication Bypass
NVD Exploit-DB VulDB
CVE-2019-25470
EPSS 0% CVSS 7.5
HIGH POC This Week

eWON Firmware versions 12.2 to 13.0 contain an authentication bypass vulnerability that allows attackers with minimal privileges to retrieve sensitive user data by exploiting the wsdReadForm endpoint. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB VulDB
CVE-2026-31872
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Parse Server versions prior to 9.6.0-alpha.6 and 8.6.32 allow attackers to bypass class-level permission restrictions on protected fields by using dot-notation in query and sort parameters, enabling enumeration of sensitive field values through binary oracle attacks. This affects both MongoDB and PostgreSQL deployments and requires no authentication or user interaction. No patch is currently available for affected versions.

Node.js PostgreSQL Authentication Bypass +1
NVD GitHub VulDB
CVE-2026-31867
EPSS 0% CVSS 4.8
MEDIUM PATCH This Month

Craft Commerce versions prior to 4.11.0 and 5.6.0 contain an IDOR vulnerability in the cart functionality that allows unauthenticated attackers to access and modify arbitrary shopping carts by guessing or knowing their 32-character identifiers. The CartController fails to validate cart ownership, enabling attackers to hijack active shopping sessions and potentially access sensitive customer information. No patch is currently available for affected versions.

Authentication Bypass Craft Commerce
NVD GitHub VulDB
CVE-2026-31863
EPSS 0% CVSS 3.6
LOW PATCH Monitor

Anytype Heart is the middleware library for Anytype. The challenge-based authentication for the local gRPC client API can be bypassed, allowing an attacker to gain access without the 4-digit code. [CVSS 3.6 LOW]

Authentication Bypass
NVD GitHub VulDB
CVE-2026-3429
EPSS 0% CVSS 4.2
MEDIUM This Month

Keycloak's Account REST API improperly validates session assurance levels, enabling authenticated attackers with a victim's password to remove MFA/OTP credentials without re-authentication and subsequently register their own authenticator. This allows complete account takeover by bypassing the intended multi-factor authentication protections. The vulnerability affects users relying on MFA as a security control and currently has no available patch.

Authentication Bypass
NVD VulDB
CVE-2026-31839
EPSS 0% CVSS 8.2
HIGH PATCH This Week

Striae versions prior to 3.0.0 allow local attackers to bypass package integrity verification by modifying both the manifest hash and package contents simultaneously, enabling delivery of tampered firearm examination data that passes validation checks. This integrity bypass affects forensic workflows relying on Striae's digital confirmation mechanism. No patch is currently available for affected installations.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-31813
EPSS 0% CVSS 4.8
MEDIUM This Month

Supabase Auth allows remote attackers to hijack user sessions by crafting fraudulent ID tokens when Apple or Azure OAuth providers are configured, enabling unauthorized access to victim accounts without requiring user interaction. An attacker can forge a valid JWT token for any target email address and exchange it at the token endpoint to obtain legitimate session credentials, effectively impersonating arbitrary users. This affects organizations using Supabase with Apple or Azure authentication enabled, with no patch currently available to remediate the vulnerability.

Microsoft Authentication Bypass Apple
NVD GitHub VulDB
CVE-2026-30239
EPSS 0% CVSS 6.5
MEDIUM This Month

Unauthorized budget assignment deletion in OpenProject prior to 17.2.0 allows any authenticated user to remove work package budget associations due to insufficient authorization checks being performed after the deletion operation. This improper access control enables users without proper permissions to manipulate budget data, potentially disrupting project financial tracking and resource allocation. A patch is available in version 17.2.0 and later.

Authentication Bypass Openproject
NVD GitHub VulDB
CVE-2026-30236
EPSS 0% CVSS 4.3
MEDIUM This Month

OpenProject prior to 17.2.0 fails to validate project membership when calculating labor costs in budget planning, allowing authenticated users to enumerate non-member employees' default billing rates. This exposure occurs both when editing budgets directly and through the cost preview calculation endpoint, potentially revealing sensitive salary information to unauthorized project users.

Authentication Bypass Openproject
NVD GitHub VulDB
CVE-2026-1524
EPSS 0%
This Week

An edgecase in SSO implementation in Neo4j Enterprise edition versions prior to version 2026.02 can lead to unauthorised access under the following conditions: If a neo4j admin configures two or more OIDC providers AND configures one or more of them to be an authorization provider AND configures one or more of them to be authentication-only, then those that are authentication-only will also provide authorization. This edgecase becomes a security problem only if the authentication-only provi...

Authentication Bypass
NVD VulDB
CVE-2026-1471
EPSS 0%
This Week

Excessive caching of authentication context in Neo4j Enterprise edition versions up to 2026.01.4 is affected by incorrect authorization.

Authentication Bypass
NVD VulDB
CVE-2025-67039
EPSS 0% CVSS 9.1
CRITICAL Act Now

Critical vulnerability in Lantronix EDS serial device server (EDS5000/EDS3000PS). Multiple injection and auth bypass vulnerabilities in the management interface.

Authentication Bypass
NVD VulDB
CVE-2025-12555
EPSS 0% CVSS 4.3
MEDIUM This Month

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.1 versions up to 18.7.6 is affected by incorrect authorization (CVSS 4.3).

Gitlab Authentication Bypass
NVD VulDB
CVE-2026-31892
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Argo Workflows versions 2.9.0 through 4.0.1 (and 3.x before 3.7.11) allow authenticated users to bypass WorkflowTemplate security policies by injecting a podSpecPatch field in workflow submissions, circumventing even strict template referencing controls. An attacker with workflow submission privileges can exploit this to modify pod specifications without security validation, potentially gaining unauthorized access or executing arbitrary code. This vulnerability affects organizations using Kubernetes with Argo Workflows and requires upgrading to versions 4.0.2, 3.7.11 or later to remediate.

Kubernetes Authentication Bypass Argo Workflows
NVD GitHub VulDB
CVE-2026-29777
EPSS 0%
PATCH Monitor

Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A tenant with write access to an HTTPRoute resource can inject backtick-delimited rule tokens into Traefik's router rule language via unsanitized header or query parameter match values. In shared gateway deployments, this can bypass listener hostname constraints and redirect traffic for victim hostnames to attacker-controlled ...

Authentication Bypass
NVD GitHub VulDB
CVE-2026-28803
EPSS 0% CVSS 6.5
MEDIUM This Month

Open Forms versions prior to 3.3.13 and 3.4.5 allow authenticated attackers to access arbitrary form submissions through submission reference enumeration or manipulation in the cosigning workflow. An attacker with valid credentials can guess or modify cosigner codes to retrieve submissions they should not have access to, resulting in unauthorized information disclosure.

Authentication Bypass Open Forms
NVD GitHub VulDB
CVE-2026-28229
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Auth bypass in Argo Workflows before 4.0.2/3.7.11.

Kubernetes Authentication Bypass Redhat +1
NVD GitHub VulDB
CVE-2026-1663
EPSS 0% CVSS 4.3
MEDIUM This Month

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 14.4 versions up to 18.7.6 is affected by missing authorization (CVSS 4.3).

Gitlab Authentication Bypass
NVD VulDB
CVE-2026-1497
EPSS 0%
This Week

Incorrect resolving of namespaces in composite databases in Neo4j Enterprise edition versions up to 2026.02 is affected by incorrect authorization.

Authentication Bypass
NVD VulDB
CVE-2025-12704
EPSS 0% CVSS 3.5
LOW Monitor

GitLab has remediated an issue in GitLab EE affecting all versions from 18.2 versions up to 18.7.6 is affected by missing authorization (CVSS 3.5).

Gitlab Authentication Bypass
NVD VulDB
CVE-2026-32229
EPSS 0% CVSS 6.8
MEDIUM This Month

JetBrains Hub versions prior to 2026.1 contain an authentication bypass vulnerability where attackers with valid credentials can gain unauthorized access to accounts through sign-in mismatches when SSO is disabled and two-factor authentication is not configured. An authenticated attacker can exploit this to achieve both confidentiality and integrity violations. No patch is currently available for this vulnerability.

Authentication Bypass
NVD VulDB
CVE-2025-67298
EPSS 0% CVSS 8.1
HIGH This Week

An issue in ClasroomIO before v.0.2.6 allows a remote attacker to escalate privileges via the endpoints /api/verify and /rest/v1/profile [CVSS 8.1 HIGH]

Authentication Bypass
NVD GitHub VulDB
CVE-2026-32059
EPSS 0% CVSS 8.8
HIGH PATCH This Week

OpenClaw version 2026.2.22-2 versions up to 2026.2.23 is affected by incorrect authorization (CVSS 8.8).

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-27842
EPSS 0% CVSS 9.8
CRITICAL Act Now

Auth bypass in MR-GM5L-S1/MR-GM5A-L1 devices.

Authentication Bypass
NVD
CVE-2026-24448
EPSS 0% CVSS 9.8
CRITICAL Act Now

Hardcoded credentials in MR-GM5L-S1/MR-GM5A-L1 devices.

Authentication Bypass
NVD
CVE-2026-29515
EPSS 0%
Monitor

embedded SwiFTP FTP server component contains a vulnerability that allows attackers to log in without valid credentials.

Authentication Bypass
NVD GitHub
CVE-2026-23813
EPSS 0% CVSS 9.8
CRITICAL Act Now

Auth bypass in HPE Aruba AOS-CX switch web management.

Authentication Bypass
NVD
CVE-2026-31838
EPSS 0% CVSS 6.9
MEDIUM This Month

Istio versions prior to 1.29.1, 1.28.5, and 1.27.8 are vulnerable to authorization policy bypass through improper Envoy RBAC handling of multi-valued HTTP headers. An attacker can craft requests with multiple header values that cause the authorization engine to evaluate headers differently than intended, allowing unauthorized access to protected microservices. No patch is currently available for this vulnerability.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-31832
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Umbraco CMS versions 14.0.0 through 16.5.0 and 17.0.0-17.2.1 contain an authorization bypass in a backoffice API endpoint that allows authenticated editors to assign domain configurations to content nodes they lack permission to access. An attacker with valid credentials could exploit this to modify domain settings on restricted content, potentially affecting content visibility or routing. The vulnerability affects Umbraco deployments without patches 16.5.1 or 17.2.2 applied.

Authentication Bypass Umbraco Cms
NVD GitHub VulDB
CVE-2026-31821
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Sylius eCommerce framework's cart API endpoint fails to validate cart ownership, allowing unauthenticated attackers to add items to other customers' shopping carts if they possess a valid cart token value. This integrity flaw affects registered users whose carts can be manipulated by external threat actors, potentially leading to fraudulent transactions or operational disruption. The vulnerability is unpatched in versions prior to 2.0.16, 2.1.12, and 2.2.3.

Authentication Bypass Sylius
NVD GitHub VulDB
CVE-2026-31820
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Authenticated users in Sylius eCommerce can access sensitive customer data belonging to other users through unvalidated resource IDs in LiveComponent parameters, including checkout addresses and shopping carts. The vulnerability exists because LiveArg parameters lack ownership validation when loading resources by ID, allowing attackers to enumerate and retrieve private information such as names, contact details, and order information without proper authorization checks.

Authentication Bypass Sylius
NVD GitHub VulDB
CVE-2026-31815
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Unicorn adds modern reactive component functionality to your Django templates. versions up to 0.67.0 is affected by improper access control (CVSS 5.3).

Python Authentication Bypass Unicorn
NVD GitHub VulDB
CVE-2026-28806
EPSS 0% CVSS 9.4
CRITICAL Act Now

Improper Authorization vulnerability in nerves-hub nerves_hub_web allows cross-organization device control via device bulk actions and device update API.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-31801
EPSS 0% CVSS 7.7
HIGH PATCH This Week

Zot registry versions 1.3.0 through 2.1.14 have an authorization bypass in the manifest upload endpoint that allows authenticated users with only create permissions to overwrite the latest tag when it already exists. An attacker with limited write privileges can leverage this flaw to replace the latest image version, potentially distributing malicious container images to downstream consumers. The vulnerability is fixed in version 2.1.15.

Authentication Bypass Zot
NVD GitHub VulDB
CVE-2026-30954
EPSS 0% CVSS 4.3
MEDIUM This Month

LinkAce versions 2.1.0 and earlier allow authenticated users to inappropriately associate other users' private taxonomies with their own links through insufficient authorization checks in the processTaxonomy() method. This enables privilege escalation where attackers can gain unauthorized access to private tags and lists belonging to other users on the same instance. The vulnerability requires valid authentication credentials and has no available patch at this time.

PHP Authentication Bypass Linkace
NVD GitHub VulDB
CVE-2025-70802
EPSS 0% CVSS 8.4
HIGH This Week

Tenda G1V3.1si V16.01.7.8 Firmware V16.01.7.8 was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root. [CVSS 8.4 HIGH]

Authentication Bypass Tenda
NVD GitHub VulDB
CVE-2025-70798
EPSS 0% CVSS 8.4
HIGH This Week

Tenda i24V3.0si V3.0.0.5 Firmware V3.0.0.5 was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root. [CVSS 8.4 HIGH]

Authentication Bypass Tenda
NVD GitHub VulDB
CVE-2026-29792
EPSS 0%
PATCH This Week

Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. From 5.0.0 to before 5.0.42, an unauthenticated attacker can send a crafted GET request directly to /oauth/:provider/callback with a forged profile in the query string. The OAuth service's authentication payload has a fallback chain that reaches params.query (the raw request query) when Gra...

Authentication Bypass
NVD GitHub VulDB
CVE-2026-26308
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Envoy's RBAC filter improperly concatenates duplicate HTTP headers into comma-separated strings instead of validating each value individually, allowing attackers to bypass "Deny" access control policies through header manipulation. This vulnerability affects Envoy versions prior to 1.34.13, 1.35.8, 1.36.5, and 1.37.1, and public exploit code exists. Patches are available for all affected versions.

Authentication Bypass Envoy
NVD GitHub VulDB
CVE-2026-26742
EPSS 0% CVSS 8.1
HIGH POC This Week

PX4 Autopilot versions 1.12.x through 1.15.x can be forced into an unsafe re-arm state when pilots switch to Manual mode and re-arm within 5 seconds of landing, bypassing critical pre-flight safety checks and throttle validation. This allows attackers or malicious pilots to trigger immediate high-thrust takeoff, resulting in loss of aircraft control. Public exploit code exists for this vulnerability and no patch is currently available.

Authentication Bypass Px4 Drone Autopilot
NVD GitHub VulDB
CVE-2026-26741
EPSS 0% CVSS 8.1
HIGH POC This Week

PX4 Autopilot versions 1.12.x through 1.15.x contain a logic flaw in the mode switching mechanism. [CVSS 8.1 HIGH]

Authentication Bypass Px4 Drone Autopilot
NVD GitHub VulDB
CVE-2026-30970
EPSS 0% CVSS 9.1
CRITICAL Act Now

Coral Server has a third missing authorization flaw.

Authentication Bypass AI / ML Coral Server
NVD GitHub VulDB
CVE-2026-30969
EPSS 0% CVSS 9.1
CRITICAL Act Now

Coral Server has an IDOR vulnerability enabling cross-user data access.

Authentication Bypass AI / ML Coral Server
NVD GitHub VulDB
CVE-2026-30968
EPSS 0% CVSS 9.8
CRITICAL Act Now

Coral Server open collaboration platform has a missing authorization enabling unauthenticated access to all collaboration data.

Authentication Bypass AI / ML Coral Server
NVD GitHub VulDB
CVE-2026-30956
EPSS 0% CVSS 9.9
CRITICAL POC PATCH Act Now

OneUptime prior to 10.0.21 has a third authorization bypass enabling low-privileged users to access admin functions.

Authentication Bypass Privilege Escalation Information Disclosure +2
NVD GitHub VulDB
CVE-2026-30945
EPSS 0% CVSS 7.1
HIGH PATCH This Week

StudioCMS prior to version 0.4.0 allows authenticated editors and above to revoke API tokens belonging to any user, including administrators and owners, due to insufficient authorization checks on the DELETE /studiocms_api/dashboard/api-tokens endpoint. An attacker with editor privileges can exploit this to disable critical integrations and automations by revoking tokens of higher-privileged accounts. No patch is currently available for affected versions.

Denial Of Service Authentication Bypass Studiocms
NVD GitHub VulDB
CVE-2026-30944
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Privilege escalation in StudioCMS versions prior to 0.4.0 enables authenticated Editor-level users to generate API tokens for arbitrary accounts, including administrative and owner roles, due to missing authorization validation on the /studiocms_api/dashboard/api-tokens endpoint. An attacker with basic editor privileges can exploit this to gain full administrative access without requiring the target account's credentials. No patch is currently available for affected installations.

Privilege Escalation Authentication Bypass Studiocms
NVD GitHub VulDB
CVE-2026-2742
EPSS 0%
PATCH Monitor

Authentication bypass in Vaadin framework (14.0.0-14.14.0, 23.0.0-23.6.x, and other ranges). The web application framework fails to properly enforce authentication on certain routes.

Spring Authentication Bypass
NVD GitHub VulDB
CVE-2026-2339
EPSS 0% CVSS 7.5
HIGH This Week

TUBITAK BILGEM Software Technologies Research Institute Liderahenk is affected by missing authentication for critical function (CVSS 7.5).

Command Injection Authentication Bypass
NVD VulDB
CVE-2026-26148
EPSS 0% CVSS 8.1
HIGH This Week

Local privilege escalation in Azure Entra ID SSH Login Extension for Linux stems from improper initialization of trusted variables, enabling unauthenticated attackers on affected systems to gain elevated privileges. This high-severity vulnerability (CVSS 8.1) requires local access but can compromise system confidentiality, integrity, and availability across trust boundaries. No patch is currently available.

Authentication Bypass Microsoft Azure Ad Ssh Login Extension For Linux
NVD VulDB
CVE-2026-26141
EPSS 0% CVSS 7.8
HIGH This Week

Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally. [CVSS 7.8 HIGH]

Authentication Bypass Microsoft Azure Automation Hybrid Worker Windows Extension
NVD VulDB
CVE-2026-26128
EPSS 0% CVSS 7.8
HIGH This Week

Windows SMB Server's authentication mechanism can be bypassed by local authenticated users to gain elevated privileges on affected systems. This high-severity vulnerability (CVSS 7.8) impacts confidentiality, integrity, and availability, though no patch is currently available. Organizations should implement compensating controls and monitor for exploitation attempts targeting this authentication weakness.

Microsoft Authentication Bypass Windows
NVD VulDB
CVE-2026-26117
EPSS 0% CVSS 7.8
HIGH This Week

Privilege escalation in Microsoft Azure Connected Machine Agent on Windows allows local authenticated users to bypass authentication mechanisms and gain elevated system privileges. An attacker with existing local access can exploit alternate authentication paths to escalate their permissions without user interaction. No patch is currently available for this vulnerability affecting Arc Enabled Servers.

Authentication Bypass Microsoft Arc Enabled Servers Azure Connected Machine Agent +1
NVD VulDB
CVE-2026-26113
EPSS 0% CVSS 8.4
HIGH This Week

Unsafe pointer dereference in Microsoft Office, SharePoint Server, and 365 Apps enables local code execution with high privileges on affected systems. An attacker with local access can exploit this memory safety flaw to achieve complete system compromise including data theft and modification. No patch is currently available, leaving users vulnerable until Microsoft releases a security update.

Microsoft Authentication Bypass Sharepoint Server +3
NVD VulDB
CVE-2026-26112
EPSS 0% CVSS 7.8
HIGH This Week

Microsoft Excel and Office products are vulnerable to local code execution through unsafe pointer dereferencing, requiring user interaction to trigger. An attacker with local access can exploit this flaw to achieve arbitrary code execution with full system privileges. No patch is currently available, leaving users of affected Office versions at risk.

Microsoft Authentication Bypass Office Online Server +4
NVD VulDB
CVE-2026-26110
EPSS 0% CVSS 8.4
HIGH This Week

Local code execution in Microsoft Office and 365 Apps stems from a type confusion vulnerability in memory handling that allows unauthenticated attackers to execute arbitrary code with system privileges. The vulnerability affects Office Long Term Servicing Channel deployments and requires only local access with no user interaction to trigger. No patch is currently available, making this a critical risk for organizations running affected Office versions.

Microsoft Authentication Bypass Memory Corruption +3
NVD VulDB
CVE-2026-25190
EPSS 0% CVSS 7.8
HIGH This Week

Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally. [CVSS 7.8 HIGH]

Authentication Bypass Microsoft Windows Server 2022 23h2 +14
NVD VulDB
CVE-2026-25176
EPSS 0% CVSS 7.8
HIGH This Week

Windows Ancillary Function Driver for WinSock in Windows 10 (all versions) and Windows 11 contains an access control weakness that enables authenticated local attackers to escalate privileges to system level. An attacker with standard user credentials can exploit this flaw to gain elevated rights on affected systems. No patch is currently available for this vulnerability.

Authentication Bypass Microsoft Windows 10 22h2 +14
NVD VulDB
CVE-2026-25169
EPSS 0% CVSS 6.2
MEDIUM This Month

A division by zero flaw in the Microsoft Graphics Component on Windows 10 and Windows 11 systems enables local attackers to trigger a denial of service condition without requiring special privileges or user interaction. The vulnerability affects multiple Windows versions including Windows 10 1607, 22h2 and Windows 11 25h2, 26h1, with no patch currently available.

Microsoft Authentication Bypass Windows 10 1607 +13
NVD VulDB
CVE-2026-24297
EPSS 0% CVSS 6.5
MEDIUM This Month

Windows Kerberos authentication in Server 2012 and Windows 10 (versions 1607, 1809) contains a race condition that enables unauthenticated remote attackers to circumvent security feature protections. The synchronization flaw in concurrent resource access allows attackers to bypass intended security controls without user interaction over the network. No patch is currently available for this vulnerability.

Race Condition Microsoft Authentication Bypass +8
NVD VulDB
CVE-2026-24294
EPSS 0% CVSS 7.8
HIGH This Week

Windows SMB Server authentication bypass across multiple versions (Windows 10 1607, Windows 11 23h2, Windows Server 2012/2025) permits authenticated local users to escalate privileges with high impact to confidentiality, integrity, and availability. The vulnerability stems from improper authentication validation in the SMB service, allowing a local attacker to gain system-level access without user interaction. No patch is currently available, leaving affected systems vulnerable to privilege escalation attacks from any authenticated user.

Microsoft Authentication Bypass Windows
NVD VulDB
CVE-2026-24290
EPSS 0% CVSS 7.8
HIGH This Week

Windows Projected File System in Windows 11 and Server 2022 contains improper access control that enables authenticated local users to escalate privileges to system level. An attacker with valid credentials can exploit this vulnerability to gain elevated permissions without user interaction. Currently, no patch is available to address this issue.

Microsoft Authentication Bypass Windows 11 24h2 +11
NVD VulDB
CVE-2026-23674
EPSS 0% CVSS 7.5
HIGH This Week

Windows MapUrlToZone security bypass in Windows 11 24H2, Windows 10 21H2, and Windows Server 2016/2025 allows unauthenticated remote attackers to circumvent zone-based security restrictions through improper path equivalence resolution. An attacker can exploit this network-accessible vulnerability without user interaction to bypass intended access controls. No patch is currently available for this high-severity vulnerability.

Microsoft Authentication Bypass Windows 11 24h2 +14
NVD VulDB
CVE-2026-23660
EPSS 0% CVSS 7.8
HIGH This Week

Windows Admin Center in Azure Portal contains an access control flaw that enables local authenticated users to escalate their privileges. An attacker with valid credentials can exploit this vulnerability to gain elevated permissions on the system. No patch is currently available for this issue.

Authentication Bypass Microsoft Windows Admin Center +1
NVD VulDB
CVE-2026-23654
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in the zero-shot-scfoundation AI/ML framework results from a vulnerable third-party dependency, enabling unauthenticated attackers to execute arbitrary code over the network with minimal user interaction. This high-severity vulnerability affects systems using the affected component, and no patch is currently available.

Authentication Bypass AI / ML Zero Shot Scfoundation
NVD VulDB
CVE-2026-22629
EPSS 0% CVSS 3.7
LOW Monitor

An improper restriction of excessive authentication attempts vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4 all versions, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer 6.4 all versions, FortiAnalyzer Cloud 7.6.0 through 7.6.4, FortiAnalyzer Cloud 7.4 all versions, FortiAnalyzer Cloud 7.2 all versions, FortiAnalyzer Cloud 7.0 all versions, FortiAnalyzer Cloud 6.4 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4 all...

Fortinet Authentication Bypass
NVD VulDB
CVE-2026-22628
EPSS 0% CVSS 5.3
MEDIUM This Month

Fortinet FortiSwitchAXFixed versions 1.0.0 through 1.0.1 contain an access control flaw that allows authenticated administrators to execute arbitrary system commands by uploading a malicious SSH configuration file. The vulnerability requires local access and valid admin credentials but poses a risk to organizations where admin accounts may be compromised or where insider threats are a concern. No patch is currently available.

Fortinet Authentication Bypass
NVD VulDB
CVE-2026-22572
EPSS 0% CVSS 7.2
HIGH This Week

MFA bypass in Fortinet FortiManager and FortiAnalyzer 7.2.2-7.6.3 allows attackers with valid admin credentials to disable multifactor authentication through specially crafted repeated requests. This authentication bypass (CWE-288) affects multiple product lines including FortiManager Cloud, creating high risk for unauthorized administrative access. No patch is currently available, leaving affected systems vulnerable to MFA circumvention attacks.

Fortinet Authentication Bypass Fortimanager +2
NVD VulDB
CVE-2026-21262
EPSS 0% CVSS 8.8
HIGH POC This Week

SQL Server 2016-2025 contains an improper access control flaw that allows authenticated network attackers to escalate privileges without user interaction. Public exploit code exists for this vulnerability, which carries a CVSS score of 8.8 and affects confidentiality, integrity, and availability. No patch is currently available.

Authentication Bypass Sql Server 2019 Sql Server 2022 +3
NVD VulDB GitHub
CVE-2025-69615
EPSS 0% CVSS 9.1
CRITICAL Act Now

A product has missing 2FA rate limiting allowing unlimited brute-force attempts against two-factor authentication codes.

Authentication Bypass
NVD GitHub VulDB
CVE-2025-69614
EPSS 0% CVSS 9.4
CRITICAL Act Now

A product has an access control flaw allowing activation token reuse on the password-reset endpoint for unauthorized account takeover.

Authentication Bypass
NVD GitHub VulDB
CVE-2025-48840
EPSS 0% CVSS 5.3
MEDIUM This Month

An authentication bypass by spoofing vulnerability in Fortinet FortiWeb 7.6.0 through 7.6.3, FortiWeb 7.4.0 through 7.4.8, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow a remote unauthenticated attacker to bypass hostname restrictions via a specially crafted request. [CVSS 5.3 MEDIUM]

Fortinet Authentication Bypass Fortiweb
NVD VulDB
CVE-2025-41710
EPSS 0% CVSS 6.5
MEDIUM This Month

An unauthenticated remote attacker may use hardcodes credentials to get access to the previously activated FTP Server with limited read and write privileges. [CVSS 6.5 MEDIUM]

Authentication Bypass
NVD
CVE-2025-27769
EPSS 0% CVSS 2.6
LOW Monitor

A vulnerability has been identified in Heliox Flex 180 kW EV Charging Station (All versions < F4.11.1), Heliox Mobile DC 40 kW EV Charging Station (All versions < L4.10.1). [CVSS 2.6 LOW]

Authentication Bypass
NVD
CVE-2026-30927
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Unauthorized event participation manipulation in Admidio prior to 5.0.6 allows authenticated users to register or cancel participation for other users by manipulating the user_uuid parameter in event functions. Any user with event participation privileges can exploit this to modify another user's event enrollment status without authorization. The vulnerability requires authentication and affects confidentiality through unauthorized modifications.

PHP Authentication Bypass Admidio
NVD GitHub VulDB
Prev Page 15 of 84 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy