Authentication Bypass

7650 CVEs technique

Monthly

CVE-2026-23597 MEDIUM PATCH This Month

HPE Aruba Networking 5G Core API error handling leaks sensitive information including user accounts, roles, and system configuration to unauthenticated remote attackers. Exposed internal service details can be leveraged to identify attack vectors for privilege escalation and unauthorized access. A patch is available.

Information Disclosure Authentication Bypass Aruba Networking Private 5g Core
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-23595 HIGH PATCH This Week

Unauthenticated attackers can bypass API authentication in Aruba Networking Private 5G Core to create unauthorized administrative accounts, enabling full system compromise. Successful exploitation grants attackers administrative privileges to modify configurations and access sensitive data within affected deployments.

Authentication Bypass Aruba Networking Private 5g Core
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2026-22769 CRITICAL KEV PATCH THREAT Act Now

Dell RecoverPoint for Virtual Machines prior to 6.0.3.1 HF1 contains hardcoded credentials (CVE-2026-22769, CVSS 10.0) that allow unauthenticated remote attackers with knowledge of the credentials to gain root-level access to the underlying operating system. KEV-listed, this vulnerability exposes disaster recovery infrastructure to complete compromise, potentially affecting the integrity of backup and replication data.

Dell Authentication Bypass Privilege Escalation RCE Remote Code Execution +1
NVD
CVSS 3.1
10.0
EPSS
34.2%
Threat
4.5
CVE-2026-2616 HIGH POC This Week

Hard-coded credentials in the Beetel 777VR1 Web Management Interface allow unauthenticated attackers on the local network to gain full administrative access with high integrity and confidentiality impact. Public exploit code is available and actively used, with no patch currently available from the vendor. Affected organizations should immediately implement network segmentation and access controls to restrict management interface exposure.

Authentication Bypass 777vr1 Firmware
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.2%
CVE-2024-31118 MEDIUM This Month

Missing Authorization vulnerability in Smartypants SP Project & Document Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SP Project & Document Manager: from n/a through 4.70. [CVSS 6.5 MEDIUM]

Authentication Bypass
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2022-41650 MEDIUM This Month

Missing Authorization vulnerability in Paul Custom Content by Country (by Shield Security) custom-content-by-country.This issue affects Custom Content by Country (by Shield Security): from n/a through 3.1.2. [CVSS 6.5 MEDIUM]

Authentication Bypass
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-7706 MEDIUM This Month

from 3.0.0 to 3.3.1 versions up to 3.5.0. is affected by missing authentication for critical function (CVSS 6.1).

Authentication Bypass
NVD
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-25903 Maven HIGH PATCH This Week

Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configuration properties on extension components that have specific Required Permissions based on the Restricted annotation.

Apache Authentication Bypass
NVD VulDB
CVSS 4.0
8.7
EPSS
0.0%
CVE-2025-14573 Go LOW PATCH Monitor

Mattermost versions 10.11.x <= 10.11.9 fail to enforce invite permissions when updating team settings, which allows team administrators without proper permissions to bypass restrictions and add users to their team via API requests. Mattermost Advisory ID: MMSA-2025-00561 [CVSS 3.8 LOW]

Authentication Bypass
NVD
CVSS 3.1
3.8
EPSS
0.0%
CVE-2025-14350 Go MEDIUM PATCH This Month

Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 fail to properly validate team membership when processing channel mentions which allows authenticated users to determine the existence of teams and their URL names via posting channel shortlinks and observing the channel_mentions property in the API response. [CVSS 4.3 MEDIUM]

Authentication Bypass Mattermost Server Suse
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-2550 CRITICAL Act Now

ipTIME A6004MX router has an access control vulnerability in VPN client configuration enabling unauthorized network access.

File Upload Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-0999 Go MEDIUM PATCH This Month

Mattermost Server versions 11.1.x through 11.1.2, 10.11.x through 10.11.9, and 11.2.x through 11.2.1 inadequately enforce login method restrictions, permitting authenticated users to circumvent SSO-only requirements by authenticating with a userID instead. This allows an attacker with valid credentials to gain unauthorized access to accounts restricted to single sign-on authentication. No patch is currently available for this vulnerability.

Authentication Bypass Mattermost Server Suse
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-26367 HIGH POC This Week

eNet Smart Home server versions 2.2.1 and 2.3.1 allow authenticated users to delete arbitrary user accounts through an authorization bypass in the deleteUserAccount JSON-RPC method. Any low-privileged user can submit a crafted request to remove other accounts without elevated permissions, and public exploit code exists for this vulnerability. The impact includes unauthorized account deletion and potential denial of service, with no patch currently available.

Authentication Bypass Enet Smart Home
NVD
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-2541 Monitor

The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling codes, providing only 64 possible combinations. This low entropy allows an attacker to perform a brute-force attack against one component of the rolling code.

Authentication Bypass
NVD
EPSS
0.0%
CVE-2026-2540 Monitor

The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks. This attack requires sending two previously captured codes in a specific sequence.

Authentication Bypass
NVD
EPSS
0.0%
CVE-2026-23139 HIGH PATCH This Week

The Linux kernel netfilter connection tracking module fails to properly manage garbage collection timing, allowing an attacker with local access to bypass cleanup operations and cause unbounded memory consumption on affected systems. By maintaining a sufficiently high packet rate, an attacker can prevent the garbage collector from executing, causing the connection tracking list to grow indefinitely and potentially lead to denial of service. No patch is currently available for this vulnerability.

Linux Authentication Bypass Redhat Suse
NVD VulDB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-2144 HIGH This Week

Privilege escalation in the Magic Login Mail or QR Code WordPress plugin (versions up to 2.05) allows unauthenticated attackers to hijack any user account, including administrator accounts, by exploiting a race condition in QR code file handling. The plugin creates QR code login images with predictable filenames in the public uploads directory and fails to delete them immediately after email transmission, enabling attackers to intercept the encoded login URLs. An attacker can trigger login requests for arbitrary users and extract valid authentication tokens during the window before file cleanup occurs.

WordPress Privilege Escalation Authentication Bypass
NVD
CVSS 3.1
8.1
EPSS
0.1%
CVE-2026-0692 HIGH This Week

Unauthenticated attackers can forge IPN payment notifications in the BlueSnap Payment Gateway for WooCommerce plugin by spoofing whitelisted IP addresses through header manipulation, allowing them to arbitrarily modify order statuses without authorization. The vulnerability stems from improper IP validation in all versions up to 3.3.0, affecting WordPress installations with this payment plugin active. No patch is currently available.

WordPress Authentication Bypass
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-24853 HIGH This Week

Caido versions prior to 0.55.0 can be bypassed using a crafted X-Forwarded-Host header to circumvent domain whitelist restrictions, allowing unauthenticated remote attackers to reach non-whitelisted domains through port 8080. This vulnerability affects all users of the web security auditing toolkit and could enable attackers to exfiltrate data or attack internal systems. No patch is currently available for affected versions.

Authentication Bypass Caido
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2025-70866 HIGH POC This Week

LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. [CVSS 8.8 HIGH]

Authentication Bypass Lavalite
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-26190 Go CRITICAL POC PATCH Act Now

Unauthenticated API access in Milvus vector database before 2.5.27/2.6.10. TCP port 9091 exposed by default without authentication. EPSS 0.32% with PoC and patch available.

Authentication Bypass AI / ML Milvus Suse
NVD GitHub
CVSS 3.1
9.8
EPSS
0.3%
CVE-2026-25531 MEDIUM POC PATCH This Month

Kanboard versions prior to 1.2.50 allow authenticated users to duplicate tasks into projects they lack access permissions for due to insufficient validation in the TaskCreationController endpoint. This privilege escalation vulnerability enables users to move sensitive tasks across project boundaries they should not be able to access. Public exploit code exists for this incomplete fix of a prior authorization bypass vulnerability.

Authentication Bypass Kanboard
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-1619 HIGH This Week

Flexcity versions up to 1.0.36. is affected by authorization bypass through user-controlled key (CVSS 8.3).

Authentication Bypass Flexcity
NVD
CVSS 3.1
8.3
EPSS
0.0%
CVE-2026-1618 HIGH This Week

Flexcity versions before 1.0.36 contain an authentication bypass vulnerability that allows authenticated users to escalate their privileges through an alternate access path. An attacker with valid credentials can exploit this flaw to gain unauthorized elevated access to the system. No patch is currently available.

Privilege Escalation Authentication Bypass Flexcity
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2019-25335 HIGH POC This Week

PRO-7070 Hazır Profesyonel Web Sitesi version 1.0 contains an authentication bypass vulnerability in the administration panel login page. Attackers can bypass authentication by using '=' 'or' as both username and password to gain unauthorized access to the administrative interface. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.1%
CVE-2019-25325 HIGH POC This Week

Thrive Smart Home 1.1 contains an SQL injection vulnerability in the checklogin.php endpoint that allows unauthenticated attackers to bypass authentication by manipulating the 'user' POST parameter. [CVSS 8.2 HIGH]

PHP SQLi Authentication Bypass
NVD Exploit-DB
CVSS 3.1
8.2
EPSS
0.3%
CVE-2019-25322 HIGH POC This Week

Heatmiser Netmonitor 3.03 contains a hardcoded credentials vulnerability in the networkSetup.htm page with predictable admin login credentials. Attackers can access the device by using the hard-coded username 'admin' and password 'admin' in the hidden form input fields. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2019-25320 MEDIUM POC This Month

E Learning Script 1.0 contains an authentication bypass vulnerability that allows attackers to access the dashboard without valid credentials by manipulating login parameters. [CVSS 6.5 MEDIUM]

PHP Authentication Bypass
NVD GitHub Exploit-DB
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-26055 Go HIGH PATCH This Week

Unauthenticated webhook endpoints in Yoke's Air Traffic Controller component allow any pod within a Kubernetes cluster to submit AdmissionReview requests and execute WASM modules in the controller's context without authorization. This affects Yoke versions 0.19.0 and earlier, enabling attackers with cluster access to bypass API Server authentication and potentially compromise the infrastructure-as-code deployment pipeline. No patch is currently available.

Kubernetes Authentication Bypass Suse
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-25922 HIGH This Week

authentik is an open-source identity provider. [CVSS 8.8 HIGH]

Authentication Bypass Authentik
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-25768 MEDIUM PATCH This Month

Authenticated users in LavinMQ versions before 2.6.6 can read sensitive broker metadata they lack permissions to access, resulting in information disclosure. This vulnerability requires valid credentials but poses a risk in multi-tenant deployments where access controls should be strictly enforced. A patch is available in version 2.6.6.

Authentication Bypass Lavinmq
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-25767 HIGH PATCH This Week

Authenticated users holding the Policymaker tag in LavinMQ prior to version 2.6.8 can create shovels that bypass access controls, allowing them to read from or publish messages to unauthorized virtual hosts. This privilege escalation vulnerability affects multi-tenant deployments where access segregation is critical. A patch is available in version 2.6.8 and later.

Authentication Bypass Lavinmq
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-25748 HIGH This Week

Authentik Proxy Provider allows authentication bypass through malformed cookies when deployed with Traefik or Caddy as a reverse proxy, enabling attackers to access protected applications by circumventing forward authentication checks. The vulnerability stems from improper cookie validation that prevents the setting of required authentik-specific X-Authentik-* headers, potentially granting unauthorized access depending on the backend application's configuration. Affected versions prior to 2025.10.4 and 2025.12.4 are vulnerable; patches are available in the specified releases.

Authentication Bypass Authentik
NVD GitHub
CVSS 3.1
8.6
EPSS
0.0%
CVE-2019-25347 HIGH POC This Week

thesystem App 1.0 contains a SQL injection vulnerability that allows attackers to bypass authentication by manipulating the username parameter. Attackers can inject malicious SQL code like ' or '1=1 to the username field to gain unauthorized access to user accounts. [CVSS 7.5 HIGH]

SQLi Authentication Bypass Password Management Application
NVD GitHub Exploit-DB
CVSS 3.1
7.5
EPSS
0.2%
CVE-2019-25346 HIGH POC This Week

TheSystem 1.0 contains a SQL injection vulnerability that allows attackers to bypass authentication by manipulating the 'server_name' parameter. Attackers can inject malicious SQL code like ' or '1=1 to retrieve unauthorized database records and potentially access sensitive system information. [CVSS 7.5 HIGH]

SQLi Authentication Bypass Password Management Application
NVD GitHub Exploit-DB
CVSS 3.1
7.5
EPSS
0.2%
CVE-2026-26218 CRITICAL POC Act Now

Hardcoded admin credentials in newbee-mall e-commerce platform database initialization script. PoC available.

Authentication Bypass Newbee Mall
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-52533 Monitor

Improper Access Control in an on-chip debug interface could allow a privileged attacker to enable a debug interface and potentially compromise data confidentiality or integrity.

Authentication Bypass
NVD
EPSS
0.0%
CVE-2025-69752 MEDIUM This Month

An issue in the "My Details" user profile functionality of Ideagen Q-Pulse 7.1.0.32 allows an authenticated user to view other users' profile information by modifying the objectKey HTTP parameter in the My Details page URL. [CVSS 4.3 MEDIUM]

Authentication Bypass
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-13004 MEDIUM This Month

Authorization Bypass Through User-Controlled Key vulnerability in Farktor Software E-Commerce Services Inc. E-Commerce Package allows Manipulating User-Controlled Variables.This issue affects E-Commerce Package: through 27112025. [CVSS 6.3 MEDIUM]

Authentication Bypass E Commerce Package
NVD
CVSS 3.1
6.3
EPSS
0.0%
CVE-2025-15573 CRITICAL Act Now

Missing certificate validation in SolaX solar inverter MQTT connections to Alibaba Cloud. Devices accept any server certificate, enabling MITM attacks on solar energy infrastructure.

Authentication Bypass
NVD
CVSS 3.1
9.4
EPSS
0.0%
CVE-2026-1729 CRITICAL Act Now

Authentication bypass in AdForest WordPress theme (all versions through 6.0.12) allows unauthenticated attackers to take over any user account.

WordPress Authentication Bypass
NVD
CVSS 3.1
9.8
EPSS
0.3%
CVE-2026-20677 CRITICAL Act Now

Race condition in Apple macOS/iOS symlink handling allows privilege escalation. Fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5.

Apple Race Condition Authentication Bypass
NVD
CVSS 3.1
9.0
EPSS
0.1%
CVE-2026-20661 MEDIUM This Month

iOS and iPadOS devices with physical access vulnerabilities allow attackers to bypass authorization controls and access sensitive user information on locked devices through improper state management. The flaw affects multiple iOS versions including 18.7.5 and earlier, requiring only physical access to the device with no user interaction or elevated privileges. Apple has issued patches in iOS 26.3 and iPadOS 26.3, though updates for earlier versions (iOS 18.7.5 and iPadOS 18.7.5) are also available.

Apple Authentication Bypass
NVD
CVSS 3.1
4.6
EPSS
0.0%
CVE-2026-20656 LOW Monitor

A logic issue was addressed with improved validation. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5, Safari 26.3, macOS Tahoe 26.3. [CVSS 3.3 LOW]

Apple Authentication Bypass
NVD
CVSS 3.1
3.3
EPSS
0.0%
CVE-2026-20655 MEDIUM This Month

Sensitive information disclosure in Apple iOS and iPadOS results from improper state management in authorization checks, allowing an attacker with physical access to a locked device to view confidential user data. The vulnerability affects multiple iOS and iPadOS versions and currently lacks an available patch. Local privilege or device access is required, making this a risk primarily to users whose devices may be physically compromised.

Apple Authentication Bypass
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-20628 HIGH This Week

Sandbox escape vulnerability in Apple's macOS, iOS, tvOS, and related platforms (CVE-2026-20628) permits malicious applications to break out of their sandbox restrictions through a permissions bypass. A local attacker with user interaction can achieve high-impact confidentiality and integrity violations by exploiting this weakness. Patches are available across multiple OS versions including macOS Tahoe 26.3, iOS 18.7.5, tvOS 26.3, and others.

Apple Authentication Bypass
NVD
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-20626 HIGH This Week

Privilege escalation vulnerability in Apple's macOS, iOS, iPadOS, and visionOS allows a malicious application to obtain root-level access through insufficient authorization checks. Local attackers with the ability to install or execute an app can exploit this to gain complete system control. No patch is currently available for this high-severity vulnerability affecting multiple Apple platforms.

Apple Authentication Bypass
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-20624 MEDIUM This Month

Improper input validation in macOS Sequoia, Tahoe, and Sonoma allows local applications to access sensitive user data through an injection attack that requires user interaction. An attacker with a malicious app could exploit this vulnerability to read confidential information on affected systems. No patch is currently available for this medium-severity issue.

Apple Authentication Bypass
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-67135 CRITICAL Act Now

Code replay attack on PF-50 keyfob of PGST PG107 Alarm System 1.25.05.hf. Physical security system vulnerable to replay of wireless signals.

Authentication Bypass
NVD
CVSS 3.1
9.8
EPSS
0.0%
CVE-2026-26031 MEDIUM This Month

Frappe Learning Management System versions prior to 2.44.0 contain an information disclosure vulnerability that allows unauthenticated attackers to enumerate enrolled student email addresses from course batches. The flaw stems from improper access controls (CWE-863) that fail to restrict visibility of sensitive enrollment data to authorized users only. An attacker can exploit this over the network without authentication to obtain a complete roster of student contact information.

Authentication Bypass Learning
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-26012 MEDIUM This Month

Vaultwarden versions prior to 1.35.3 allow authenticated organization members to bypass collection-level access controls and retrieve all ciphers within their organization through the /ciphers/organization-details endpoint. An attacker with regular member privileges can access sensitive credentials and encrypted data they should not have permission to view. No patch is currently available for affected deployments.

Authentication Bypass Vaultwarden Redhat
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2024-50617 HIGH This Week

Vulnerabilities in the File Download and Get File handler components in CIPPlanner CIPAce before 9.17 allow attackers to download unauthorized files. An authenticated user can easily change the file id parameter or pass the physical file path in the URL query string to retrieve the files. [CVSS 7.5 HIGH]

Authentication Bypass Cipace
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-68663 MEDIUM This Month

Outline is a service that allows for collaborative documentation. [CVSS 5.3 MEDIUM]

Authentication Bypass Outline
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2020-37156 MEDIUM POC This Month

login.php contains a vulnerability that allows attackers to access the dashboard without valid credentials (CVSS 6.5).

PHP Authentication Bypass
NVD GitHub Exploit-DB
CVSS 3.1
6.5
EPSS
0.1%
CVE-2024-50618 MEDIUM This Month

Cipace versions up to 9.17 contains a vulnerability that allows attackers to bypass a protection mechanism (CVSS 4.3).

Authentication Bypass Cipace
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-25084 CRITICAL Act Now

Authentication bypass in ZLAN5143D by directly accessing internal URLs. Access controls enforced only at the frontend, bypassed by direct API calls.

Authentication Bypass
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-24789 CRITICAL Act Now

Unauthenticated device password change API in industrial/IoT device. Remote attackers can change the device password without any authentication.

Authentication Bypass
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-13391 MEDIUM This Month

The Product Options and Price Calculation Formulas for WooCommerce - Uni CPO (Premium) plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'uni_cpo_remove_file' function in all versions up to, and including, 4.9.60. [CVSS 5.8 MEDIUM]

WordPress Authentication Bypass
NVD
CVSS 3.1
5.8
EPSS
0.1%
CVE-2025-64075 CRITICAL Act Now

Authentication bypass via path traversal in ZBT WE2001 router's check_token function. EPSS 0.69% — crafted requests bypass authentication entirely. CVSS 10.0.

Industrial Authentication Bypass Path Traversal
NVD
CVSS 3.1
10.0
EPSS
0.7%
CVE-2026-2249 CRITICAL Act Now

Unauthenticated web shell in METIS DFS devices (versions <= oscore 2.1.234-r18). Same vulnerability as CVE-2026-2248 but on DFS product line.

Authentication Bypass Information Disclosure RCE
NVD
CVSS 3.1
9.8
EPSS
0.3%
CVE-2026-2248 CRITICAL Act Now

Unauthenticated web shell in METIS WIC devices (versions <= oscore 2.1.234-r18). The /console endpoint provides shell access without authentication. First of two related METIS CVEs.

Authentication Bypass Information Disclosure RCE
NVD
CVSS 3.1
9.8
EPSS
0.3%
CVE-2025-8025 CRITICAL Act Now

Missing authentication for critical functions in Dinosoft ERP. Unauthenticated access to business functionality.

Authentication Bypass
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-1748 MEDIUM This Month

The Invoct PDF Invoices & Billing for WooCommerce plugin through version 1.6 fails to enforce capability checks, allowing authenticated Subscriber-level users to access sensitive data including invoice details, client information, and WordPress user email addresses. This privilege escalation vulnerability affects all WordPress installations using the affected plugin versions and has no available patch.

WordPress Authentication Bypass
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-10912 MEDIUM This Month

Saastech Cleaning and Internet Services Inc. TemizlikYolda is affected by authorization bypass through user-controlled key (CVSS 5.4).

Authentication Bypass
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-15400 MEDIUM This Month

The Pix para Woocommerce WordPress plugin through 2.13.3 allows any authenticated user to trigger AJAX actions that reset payment gateway configuration options without capability or nonce checks. [CVSS 6.5 MEDIUM]

WordPress Authentication Bypass
NVD WPScan
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-1495 MEDIUM This Month

Unprivileged users with Event Log Reader privileges can extract proxy server credentials and URLs from PI to CONNECT event logs, potentially enabling unauthorized proxy access. This local information disclosure affects systems where such log access is granted to low-privileged accounts. No patch is currently available.

Authentication Bypass Information Disclosure
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-48517 Monitor

Insufficient Granularity of Access Control in SEV firmware could allow a privileged user with a malicious hypervisor to create a SEV-ES guest with an ASID in the range meant for SEV-SNP guests potentially resulting in a partial loss of confidentiality.

Authentication Bypass
NVD
EPSS
0.0%
CVE-2025-48514 Monitor

Insufficient Granularity of Access Control in SEV firmware can allow a privileged attacker to create a SEV-ES Guest to attack SNP guest, potentially resulting in a loss of confidentiality.

Authentication Bypass
NVD
EPSS
0.0%
CVE-2025-29948 Monitor

Improper access control in AMD Secure Encrypted Virtualization (SEV) firmware could allow a malicious hypervisor to bypass RMP protections, potentially resulting in a loss of SEV-SNP guest memory integrity.

Authentication Bypass
NVD
EPSS
0.0%
CVE-2025-29939 Monitor

Improper access control in secure encrypted virtualization (SEV) could allow a privileged attacker to write to the reverse map page (RMP) during secure nested paging (SNP) initialization, potentially resulting in a loss of guest memory confidentiality and integrity.

Authentication Bypass
NVD
EPSS
0.0%
CVE-2026-25609 MEDIUM This Month

MongoDB's profile command fails to properly validate requests that modify the 'filter' parameter, incorrectly classifying write operations as read-only and bypassing authorization controls. An authenticated attacker could exploit this to modify database filters without proper access restrictions, potentially altering query behavior and data visibility. No patch is currently available.

Authentication Bypass MongoDB
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-21513 HIGH KEV THREAT Act Now

MSHTML Framework contains a protection mechanism failure (CVE-2026-21513, CVSS 8.8) allowing remote attackers to bypass security features over a network. KEV-listed, this vulnerability in the legacy HTML rendering engine (still used by many Windows applications and email clients) enables execution of malicious content by circumventing the browser's security sandbox and content restrictions.

Authentication Bypass
NVD VulDB
CVSS 3.1
8.8
EPSS
4.8%
CVE-2026-0653 MEDIUM This Month

Guest users on TP-Link Tapo C260 v1 cameras can modify protected device settings by exploiting inadequate access controls on synchronization endpoints. Authenticated attackers with limited privileges can bypass restrictions to change sensitive configuration parameters without authorization. No patch is currently available for this vulnerability.

TP-Link Authentication Bypass RCE Tapo C260 Firmware
NVD VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-25530 MEDIUM POC PATCH This Month

Kanboard versions up to 1.2.50 is affected by authorization bypass through user-controlled key (CVSS 4.3).

Authentication Bypass Kanboard
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-22153 HIGH This Week

Fortios versions up to 7.6.4 contains a vulnerability that allows attackers to an unauthenticated attacker to bypass LDAP authentication of Agentless VPN or FS (CVSS 8.1).

Fortinet Fortigate Ldap Authentication Bypass Fortios
NVD
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-1603 HIGH KEV THREAT Act Now

Ivanti Endpoint Manager before 2024 SU5 contains an authentication bypass (CVE-2026-1603, CVSS 8.6) that allows unauthenticated remote attackers to leak stored credential data. KEV-listed with EPSS 43.9%, this vulnerability exposes credentials stored in the endpoint management platform — potentially including service accounts, deployment credentials, and other secrets used to manage the entire endpoint fleet.

Ivanti Authentication Bypass Endpoint Manager
NVD
CVSS 3.1
8.6
EPSS
43.9%
Threat
4.5
CVE-2025-7347 HIGH This Week

Dinibh Puzzle Software Solutions Dinibh Patrol Tracking System is affected by authorization bypass through user-controlled key (CVSS 8.8).

Authentication Bypass
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2025-6967 HIGH This Week

Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. CMS contains a security vulnerability (CVSS 8.7).

Authentication Bypass
NVD
CVSS 3.1
8.7
EPSS
0.0%
CVE-2026-23906 Maven CRITICAL PATCH Act Now

Authentication bypass in Apache Druid versions 0.17.0 through 35.x. Affects all versions prior to 36.0.0 when specific prerequisites are met.

Apache Dns Ldap Authentication Bypass Druid
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2024-52334 MEDIUM This Month

A vulnerability has been identified in syngo.plaza VB30E (All versions < VB30E_HF07). The affected application does not encrypt the passwords properly. [CVSS 5.3 MEDIUM]

Authentication Bypass
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-2096 CRITICAL Act Now

Missing authentication in Flowring Agentflow allows unauthenticated attackers to read, modify, and delete data. Second auth bypass CVE.

Authentication Bypass AI / ML Agentflow
NVD
CVSS 3.1
9.8
EPSS
0.3%
CVE-2026-2095 CRITICAL Act Now

Authentication bypass in Flowring Agentflow workflow system allows unauthenticated remote attackers to exploit specific functions. EPSS 0.63%.

Authentication Bypass Agentflow
NVD
CVSS 3.1
9.8
EPSS
0.6%
CVE-2025-12063 MEDIUM This Month

An insecure direct object reference allowed a non-admin user to modify or remove certain data objects without having the appropriate permissions. [CVSS 5.7 MEDIUM]

Authentication Bypass Camera Station Pro
NVD
CVSS 3.1
5.7
EPSS
0.0%
CVE-2026-25938 npm CRITICAL PATCH Act Now

FUXA SCADA has an authentication spoofing vulnerability from versions 1.2.8 through 1.2.10 — tenth critical vulnerability.

Scada Authentication Bypass Fuxa
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25893 npm CRITICAL PATCH Act Now

FUXA SCADA has yet another authorization bypass — now the seventh critical FUXA vulnerability discovered, enabling unauthenticated access to industrial controls.

Scada Authentication Bypass Fuxa
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25890 Go HIGH POC PATCH This Week

Path normalization bypass in Filebrowser prior to 2.57.1 allows authenticated users to circumvent file access restrictions by injecting multiple slashes into request URLs, enabling unauthorized access to files designated as restricted. The vulnerability exploits a mismatch between the authorization validation logic and filesystem path resolution, affecting users running vulnerable versions. Public exploit code exists for this high-severity issue.

Authentication Bypass Filebrowser Suse
NVD GitHub
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-25885 HIGH POC PATCH This Week

Unauthenticated message injection in PolarLearn 0-PRERELEASE-16 and earlier allows remote attackers to send persistent messages to arbitrary group chats via the WebSocket API without credentials. Public exploit code exists for this vulnerability, which affects all users of vulnerable versions by enabling spam and potential information manipulation within group communications.

Authentication Bypass Polarlearn
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25875 CRITICAL Act Now

PlaciPy has an incorrect authorization allowing privilege escalation — seventh and final critical vulnerability.

Authentication Bypass Placipy
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25811 CRITICAL Act Now

PlaciPy has an incorrect authorization vulnerability — fifth of seven critical flaws.

Authentication Bypass Placipy
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-25808 HIGH POC PATCH This Week

Hollo versions prior to 0.6.20 and 0.7.2 improperly expose direct messages and followers-only posts through the ActivityPub outbox endpoint, allowing unauthenticated remote attackers to access sensitive user communications. Public exploit code exists for this authorization bypass vulnerability, enabling attackers to enumerate and retrieve private content intended for restricted audiences. Patched versions 0.6.20 and 0.7.2 are available to remediate the exposure.

Authentication Bypass Hollo
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

HPE Aruba Networking 5G Core API error handling leaks sensitive information including user accounts, roles, and system configuration to unauthenticated remote attackers. Exposed internal service details can be leveraged to identify attack vectors for privilege escalation and unauthorized access. A patch is available.

Information Disclosure Authentication Bypass Aruba Networking Private 5g Core
NVD
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Unauthenticated attackers can bypass API authentication in Aruba Networking Private 5G Core to create unauthorized administrative accounts, enabling full system compromise. Successful exploitation grants attackers administrative privileges to modify configurations and access sensitive data within affected deployments.

Authentication Bypass Aruba Networking Private 5g Core
NVD
EPSS 34% 4.5 CVSS 10.0
CRITICAL KEV PATCH THREAT Act Now

Dell RecoverPoint for Virtual Machines prior to 6.0.3.1 HF1 contains hardcoded credentials (CVE-2026-22769, CVSS 10.0) that allow unauthenticated remote attackers with knowledge of the credentials to gain root-level access to the underlying operating system. KEV-listed, this vulnerability exposes disaster recovery infrastructure to complete compromise, potentially affecting the integrity of backup and replication data.

Dell Authentication Bypass Privilege Escalation +3
NVD
EPSS 0% CVSS 8.8
HIGH POC This Week

Hard-coded credentials in the Beetel 777VR1 Web Management Interface allow unauthenticated attackers on the local network to gain full administrative access with high integrity and confidentiality impact. Public exploit code is available and actively used, with no patch currently available from the vendor. Affected organizations should immediately implement network segmentation and access controls to restrict management interface exposure.

Authentication Bypass 777vr1 Firmware
NVD GitHub VulDB
EPSS 0% CVSS 6.5
MEDIUM This Month

Missing Authorization vulnerability in Smartypants SP Project & Document Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SP Project & Document Manager: from n/a through 4.70. [CVSS 6.5 MEDIUM]

Authentication Bypass
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

Missing Authorization vulnerability in Paul Custom Content by Country (by Shield Security) custom-content-by-country.This issue affects Custom Content by Country (by Shield Security): from n/a through 3.1.2. [CVSS 6.5 MEDIUM]

Authentication Bypass
NVD
EPSS 0% CVSS 6.1
MEDIUM This Month

from 3.0.0 to 3.3.1 versions up to 3.5.0. is affected by missing authentication for critical function (CVSS 6.1).

Authentication Bypass
NVD
EPSS 0% CVSS 8.7
HIGH PATCH This Week

Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configuration properties on extension components that have specific Required Permissions based on the Restricted annotation.

Apache Authentication Bypass
NVD VulDB
EPSS 0% CVSS 3.8
LOW PATCH Monitor

Mattermost versions 10.11.x <= 10.11.9 fail to enforce invite permissions when updating team settings, which allows team administrators without proper permissions to bypass restrictions and add users to their team via API requests. Mattermost Advisory ID: MMSA-2025-00561 [CVSS 3.8 LOW]

Authentication Bypass
NVD
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Mattermost versions 11.1.x <= 11.1.2, 10.11.x <= 10.11.9, 11.2.x <= 11.2.1 fail to properly validate team membership when processing channel mentions which allows authenticated users to determine the existence of teams and their URL names via posting channel shortlinks and observing the channel_mentions property in the API response. [CVSS 4.3 MEDIUM]

Authentication Bypass Mattermost Server Suse
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

ipTIME A6004MX router has an access control vulnerability in VPN client configuration enabling unauthorized network access.

File Upload Authentication Bypass
NVD GitHub VulDB
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Mattermost Server versions 11.1.x through 11.1.2, 10.11.x through 10.11.9, and 11.2.x through 11.2.1 inadequately enforce login method restrictions, permitting authenticated users to circumvent SSO-only requirements by authenticating with a userID instead. This allows an attacker with valid credentials to gain unauthorized access to accounts restricted to single sign-on authentication. No patch is currently available for this vulnerability.

Authentication Bypass Mattermost Server Suse
NVD
EPSS 0% CVSS 8.1
HIGH POC This Week

eNet Smart Home server versions 2.2.1 and 2.3.1 allow authenticated users to delete arbitrary user accounts through an authorization bypass in the deleteUserAccount JSON-RPC method. Any low-privileged user can submit a crafted request to remove other accounts without elevated permissions, and public exploit code exists for this vulnerability. The impact includes unauthorized account deletion and potential denial of service, with no patch currently available.

Authentication Bypass Enet Smart Home
NVD
EPSS 0%
Monitor

The Micca KE700 system relies on a 6-bit portion of an identifier for authentication within rolling codes, providing only 64 possible combinations. This low entropy allows an attacker to perform a brute-force attack against one component of the rolling code.

Authentication Bypass
NVD
EPSS 0%
Monitor

The Micca KE700 system contains flawed resynchronization logic and is vulnerable to replay attacks. This attack requires sending two previously captured codes in a specific sequence.

Authentication Bypass
NVD
EPSS 0% CVSS 7.5
HIGH PATCH This Week

The Linux kernel netfilter connection tracking module fails to properly manage garbage collection timing, allowing an attacker with local access to bypass cleanup operations and cause unbounded memory consumption on affected systems. By maintaining a sufficiently high packet rate, an attacker can prevent the garbage collector from executing, causing the connection tracking list to grow indefinitely and potentially lead to denial of service. No patch is currently available for this vulnerability.

Linux Authentication Bypass Redhat +1
NVD VulDB
EPSS 0% CVSS 8.1
HIGH This Week

Privilege escalation in the Magic Login Mail or QR Code WordPress plugin (versions up to 2.05) allows unauthenticated attackers to hijack any user account, including administrator accounts, by exploiting a race condition in QR code file handling. The plugin creates QR code login images with predictable filenames in the public uploads directory and fails to delete them immediately after email transmission, enabling attackers to intercept the encoded login URLs. An attacker can trigger login requests for arbitrary users and extract valid authentication tokens during the window before file cleanup occurs.

WordPress Privilege Escalation Authentication Bypass
NVD
EPSS 0% CVSS 7.5
HIGH This Week

Unauthenticated attackers can forge IPN payment notifications in the BlueSnap Payment Gateway for WooCommerce plugin by spoofing whitelisted IP addresses through header manipulation, allowing them to arbitrarily modify order statuses without authorization. The vulnerability stems from improper IP validation in all versions up to 3.3.0, affecting WordPress installations with this payment plugin active. No patch is currently available.

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 8.1
HIGH This Week

Caido versions prior to 0.55.0 can be bypassed using a crafted X-Forwarded-Host header to circumvent domain whitelist restrictions, allowing unauthenticated remote attackers to reach non-whitelisted domains through port 8080. This vulnerability affects all users of the web security auditing toolkit and could enable attackers to exfiltrate data or attack internal systems. No patch is currently available for affected versions.

Authentication Bypass Caido
NVD GitHub
EPSS 0% CVSS 8.8
HIGH POC This Week

LavaLite CMS 10.1.0 is vulnerable to Incorrect Access Control. An authenticated user with low-level privileges (User role) can directly access the admin backend by logging in through /admin/login. [CVSS 8.8 HIGH]

Authentication Bypass Lavalite
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Unauthenticated API access in Milvus vector database before 2.5.27/2.6.10. TCP port 9091 exposed by default without authentication. EPSS 0.32% with PoC and patch available.

Authentication Bypass AI / ML Milvus +1
NVD GitHub
EPSS 0% CVSS 4.3
MEDIUM POC PATCH This Month

Kanboard versions prior to 1.2.50 allow authenticated users to duplicate tasks into projects they lack access permissions for due to insufficient validation in the TaskCreationController endpoint. This privilege escalation vulnerability enables users to move sensitive tasks across project boundaries they should not be able to access. Public exploit code exists for this incomplete fix of a prior authorization bypass vulnerability.

Authentication Bypass Kanboard
NVD GitHub
EPSS 0% CVSS 8.3
HIGH This Week

Flexcity versions up to 1.0.36. is affected by authorization bypass through user-controlled key (CVSS 8.3).

Authentication Bypass Flexcity
NVD
EPSS 0% CVSS 8.8
HIGH This Week

Flexcity versions before 1.0.36 contain an authentication bypass vulnerability that allows authenticated users to escalate their privileges through an alternate access path. An attacker with valid credentials can exploit this flaw to gain unauthorized elevated access to the system. No patch is currently available.

Privilege Escalation Authentication Bypass Flexcity
NVD
EPSS 0% CVSS 7.5
HIGH POC This Week

PRO-7070 Hazır Profesyonel Web Sitesi version 1.0 contains an authentication bypass vulnerability in the administration panel login page. Attackers can bypass authentication by using '=' 'or' as both username and password to gain unauthorized access to the administrative interface. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
EPSS 0% CVSS 8.2
HIGH POC This Week

Thrive Smart Home 1.1 contains an SQL injection vulnerability in the checklogin.php endpoint that allows unauthenticated attackers to bypass authentication by manipulating the 'user' POST parameter. [CVSS 8.2 HIGH]

PHP SQLi Authentication Bypass
NVD Exploit-DB
EPSS 0% CVSS 7.5
HIGH POC This Week

Heatmiser Netmonitor 3.03 contains a hardcoded credentials vulnerability in the networkSetup.htm page with predictable admin login credentials. Attackers can access the device by using the hard-coded username 'admin' and password 'admin' in the hidden form input fields. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
EPSS 0% CVSS 6.5
MEDIUM POC This Month

E Learning Script 1.0 contains an authentication bypass vulnerability that allows attackers to access the dashboard without valid credentials by manipulating login parameters. [CVSS 6.5 MEDIUM]

PHP Authentication Bypass
NVD GitHub Exploit-DB
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Unauthenticated webhook endpoints in Yoke's Air Traffic Controller component allow any pod within a Kubernetes cluster to submit AdmissionReview requests and execute WASM modules in the controller's context without authorization. This affects Yoke versions 0.19.0 and earlier, enabling attackers with cluster access to bypass API Server authentication and potentially compromise the infrastructure-as-code deployment pipeline. No patch is currently available.

Kubernetes Authentication Bypass Suse
NVD GitHub
EPSS 0% CVSS 8.8
HIGH This Week

authentik is an open-source identity provider. [CVSS 8.8 HIGH]

Authentication Bypass Authentik
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Authenticated users in LavinMQ versions before 2.6.6 can read sensitive broker metadata they lack permissions to access, resulting in information disclosure. This vulnerability requires valid credentials but poses a risk in multi-tenant deployments where access controls should be strictly enforced. A patch is available in version 2.6.6.

Authentication Bypass Lavinmq
NVD GitHub
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Authenticated users holding the Policymaker tag in LavinMQ prior to version 2.6.8 can create shovels that bypass access controls, allowing them to read from or publish messages to unauthorized virtual hosts. This privilege escalation vulnerability affects multi-tenant deployments where access segregation is critical. A patch is available in version 2.6.8 and later.

Authentication Bypass Lavinmq
NVD GitHub
EPSS 0% CVSS 8.6
HIGH This Week

Authentik Proxy Provider allows authentication bypass through malformed cookies when deployed with Traefik or Caddy as a reverse proxy, enabling attackers to access protected applications by circumventing forward authentication checks. The vulnerability stems from improper cookie validation that prevents the setting of required authentik-specific X-Authentik-* headers, potentially granting unauthorized access depending on the backend application's configuration. Affected versions prior to 2025.10.4 and 2025.12.4 are vulnerable; patches are available in the specified releases.

Authentication Bypass Authentik
NVD GitHub
EPSS 0% CVSS 7.5
HIGH POC This Week

thesystem App 1.0 contains a SQL injection vulnerability that allows attackers to bypass authentication by manipulating the username parameter. Attackers can inject malicious SQL code like ' or '1=1 to the username field to gain unauthorized access to user accounts. [CVSS 7.5 HIGH]

SQLi Authentication Bypass Password Management Application
NVD GitHub Exploit-DB
EPSS 0% CVSS 7.5
HIGH POC This Week

TheSystem 1.0 contains a SQL injection vulnerability that allows attackers to bypass authentication by manipulating the 'server_name' parameter. Attackers can inject malicious SQL code like ' or '1=1 to retrieve unauthorized database records and potentially access sensitive system information. [CVSS 7.5 HIGH]

SQLi Authentication Bypass Password Management Application
NVD GitHub Exploit-DB
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Hardcoded admin credentials in newbee-mall e-commerce platform database initialization script. PoC available.

Authentication Bypass Newbee Mall
NVD GitHub
EPSS 0%
Monitor

Improper Access Control in an on-chip debug interface could allow a privileged attacker to enable a debug interface and potentially compromise data confidentiality or integrity.

Authentication Bypass
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

An issue in the "My Details" user profile functionality of Ideagen Q-Pulse 7.1.0.32 allows an authenticated user to view other users' profile information by modifying the objectKey HTTP parameter in the My Details page URL. [CVSS 4.3 MEDIUM]

Authentication Bypass
NVD GitHub
EPSS 0% CVSS 6.3
MEDIUM This Month

Authorization Bypass Through User-Controlled Key vulnerability in Farktor Software E-Commerce Services Inc. E-Commerce Package allows Manipulating User-Controlled Variables.This issue affects E-Commerce Package: through 27112025. [CVSS 6.3 MEDIUM]

Authentication Bypass E Commerce Package
NVD
EPSS 0% CVSS 9.4
CRITICAL Act Now

Missing certificate validation in SolaX solar inverter MQTT connections to Alibaba Cloud. Devices accept any server certificate, enabling MITM attacks on solar energy infrastructure.

Authentication Bypass
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

Authentication bypass in AdForest WordPress theme (all versions through 6.0.12) allows unauthenticated attackers to take over any user account.

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 9.0
CRITICAL Act Now

Race condition in Apple macOS/iOS symlink handling allows privilege escalation. Fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5.

Apple Race Condition Authentication Bypass
NVD
EPSS 0% CVSS 4.6
MEDIUM This Month

iOS and iPadOS devices with physical access vulnerabilities allow attackers to bypass authorization controls and access sensitive user information on locked devices through improper state management. The flaw affects multiple iOS versions including 18.7.5 and earlier, requiring only physical access to the device with no user interaction or elevated privileges. Apple has issued patches in iOS 26.3 and iPadOS 26.3, though updates for earlier versions (iOS 18.7.5 and iPadOS 18.7.5) are also available.

Apple Authentication Bypass
NVD
EPSS 0% CVSS 3.3
LOW Monitor

A logic issue was addressed with improved validation. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5, Safari 26.3, macOS Tahoe 26.3. [CVSS 3.3 LOW]

Apple Authentication Bypass
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

Sensitive information disclosure in Apple iOS and iPadOS results from improper state management in authorization checks, allowing an attacker with physical access to a locked device to view confidential user data. The vulnerability affects multiple iOS and iPadOS versions and currently lacks an available patch. Local privilege or device access is required, making this a risk primarily to users whose devices may be physically compromised.

Apple Authentication Bypass
NVD
EPSS 0% CVSS 7.1
HIGH This Week

Sandbox escape vulnerability in Apple's macOS, iOS, tvOS, and related platforms (CVE-2026-20628) permits malicious applications to break out of their sandbox restrictions through a permissions bypass. A local attacker with user interaction can achieve high-impact confidentiality and integrity violations by exploiting this weakness. Patches are available across multiple OS versions including macOS Tahoe 26.3, iOS 18.7.5, tvOS 26.3, and others.

Apple Authentication Bypass
NVD
EPSS 0% CVSS 7.8
HIGH This Week

Privilege escalation vulnerability in Apple's macOS, iOS, iPadOS, and visionOS allows a malicious application to obtain root-level access through insufficient authorization checks. Local attackers with the ability to install or execute an app can exploit this to gain complete system control. No patch is currently available for this high-severity vulnerability affecting multiple Apple platforms.

Apple Authentication Bypass
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

Improper input validation in macOS Sequoia, Tahoe, and Sonoma allows local applications to access sensitive user data through an injection attack that requires user interaction. An attacker with a malicious app could exploit this vulnerability to read confidential information on affected systems. No patch is currently available for this medium-severity issue.

Apple Authentication Bypass
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

Code replay attack on PF-50 keyfob of PGST PG107 Alarm System 1.25.05.hf. Physical security system vulnerable to replay of wireless signals.

Authentication Bypass
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

Frappe Learning Management System versions prior to 2.44.0 contain an information disclosure vulnerability that allows unauthenticated attackers to enumerate enrolled student email addresses from course batches. The flaw stems from improper access controls (CWE-863) that fail to restrict visibility of sensitive enrollment data to authorized users only. An attacker can exploit this over the network without authentication to obtain a complete roster of student contact information.

Authentication Bypass Learning
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM This Month

Vaultwarden versions prior to 1.35.3 allow authenticated organization members to bypass collection-level access controls and retrieve all ciphers within their organization through the /ciphers/organization-details endpoint. An attacker with regular member privileges can access sensitive credentials and encrypted data they should not have permission to view. No patch is currently available for affected deployments.

Authentication Bypass Vaultwarden Redhat
NVD GitHub
EPSS 0% CVSS 7.5
HIGH This Week

Vulnerabilities in the File Download and Get File handler components in CIPPlanner CIPAce before 9.17 allow attackers to download unauthorized files. An authenticated user can easily change the file id parameter or pass the physical file path in the URL query string to retrieve the files. [CVSS 7.5 HIGH]

Authentication Bypass Cipace
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

Outline is a service that allows for collaborative documentation. [CVSS 5.3 MEDIUM]

Authentication Bypass Outline
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM POC This Month

login.php contains a vulnerability that allows attackers to access the dashboard without valid credentials (CVSS 6.5).

PHP Authentication Bypass
NVD GitHub Exploit-DB
EPSS 0% CVSS 4.3
MEDIUM This Month

Cipace versions up to 9.17 contains a vulnerability that allows attackers to bypass a protection mechanism (CVSS 4.3).

Authentication Bypass Cipace
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

Authentication bypass in ZLAN5143D by directly accessing internal URLs. Access controls enforced only at the frontend, bypassed by direct API calls.

Authentication Bypass
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL Act Now

Unauthenticated device password change API in industrial/IoT device. Remote attackers can change the device password without any authentication.

Authentication Bypass
NVD GitHub
EPSS 0% CVSS 5.8
MEDIUM This Month

The Product Options and Price Calculation Formulas for WooCommerce - Uni CPO (Premium) plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'uni_cpo_remove_file' function in all versions up to, and including, 4.9.60. [CVSS 5.8 MEDIUM]

WordPress Authentication Bypass
NVD
EPSS 1% CVSS 10.0
CRITICAL Act Now

Authentication bypass via path traversal in ZBT WE2001 router's check_token function. EPSS 0.69% — crafted requests bypass authentication entirely. CVSS 10.0.

Industrial Authentication Bypass Path Traversal
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

Unauthenticated web shell in METIS DFS devices (versions <= oscore 2.1.234-r18). Same vulnerability as CVE-2026-2248 but on DFS product line.

Authentication Bypass Information Disclosure RCE
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

Unauthenticated web shell in METIS WIC devices (versions <= oscore 2.1.234-r18). The /console endpoint provides shell access without authentication. First of two related METIS CVEs.

Authentication Bypass Information Disclosure RCE
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

Missing authentication for critical functions in Dinosoft ERP. Unauthenticated access to business functionality.

Authentication Bypass
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

The Invoct PDF Invoices & Billing for WooCommerce plugin through version 1.6 fails to enforce capability checks, allowing authenticated Subscriber-level users to access sensitive data including invoice details, client information, and WordPress user email addresses. This privilege escalation vulnerability affects all WordPress installations using the affected plugin versions and has no available patch.

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 5.4
MEDIUM This Month

Saastech Cleaning and Internet Services Inc. TemizlikYolda is affected by authorization bypass through user-controlled key (CVSS 5.4).

Authentication Bypass
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

The Pix para Woocommerce WordPress plugin through 2.13.3 allows any authenticated user to trigger AJAX actions that reset payment gateway configuration options without capability or nonce checks. [CVSS 6.5 MEDIUM]

WordPress Authentication Bypass
NVD WPScan
EPSS 0% CVSS 6.5
MEDIUM This Month

Unprivileged users with Event Log Reader privileges can extract proxy server credentials and URLs from PI to CONNECT event logs, potentially enabling unauthorized proxy access. This local information disclosure affects systems where such log access is granted to low-privileged accounts. No patch is currently available.

Authentication Bypass Information Disclosure
NVD
EPSS 0%
Monitor

Insufficient Granularity of Access Control in SEV firmware could allow a privileged user with a malicious hypervisor to create a SEV-ES guest with an ASID in the range meant for SEV-SNP guests potentially resulting in a partial loss of confidentiality.

Authentication Bypass
NVD
EPSS 0%
Monitor

Insufficient Granularity of Access Control in SEV firmware can allow a privileged attacker to create a SEV-ES Guest to attack SNP guest, potentially resulting in a loss of confidentiality.

Authentication Bypass
NVD
EPSS 0%
Monitor

Improper access control in AMD Secure Encrypted Virtualization (SEV) firmware could allow a malicious hypervisor to bypass RMP protections, potentially resulting in a loss of SEV-SNP guest memory integrity.

Authentication Bypass
NVD
EPSS 0%
Monitor

Improper access control in secure encrypted virtualization (SEV) could allow a privileged attacker to write to the reverse map page (RMP) during secure nested paging (SNP) initialization, potentially resulting in a loss of guest memory confidentiality and integrity.

Authentication Bypass
NVD
EPSS 0% CVSS 5.4
MEDIUM This Month

MongoDB's profile command fails to properly validate requests that modify the 'filter' parameter, incorrectly classifying write operations as read-only and bypassing authorization controls. An authenticated attacker could exploit this to modify database filters without proper access restrictions, potentially altering query behavior and data visibility. No patch is currently available.

Authentication Bypass MongoDB
NVD
EPSS 5% CVSS 8.8
HIGH KEV THREAT Act Now

MSHTML Framework contains a protection mechanism failure (CVE-2026-21513, CVSS 8.8) allowing remote attackers to bypass security features over a network. KEV-listed, this vulnerability in the legacy HTML rendering engine (still used by many Windows applications and email clients) enables execution of malicious content by circumventing the browser's security sandbox and content restrictions.

Authentication Bypass
NVD VulDB
EPSS 0% CVSS 6.5
MEDIUM This Month

Guest users on TP-Link Tapo C260 v1 cameras can modify protected device settings by exploiting inadequate access controls on synchronization endpoints. Authenticated attackers with limited privileges can bypass restrictions to change sensitive configuration parameters without authorization. No patch is currently available for this vulnerability.

TP-Link Authentication Bypass RCE +1
NVD VulDB
EPSS 0% CVSS 4.3
MEDIUM POC PATCH This Month

Kanboard versions up to 1.2.50 is affected by authorization bypass through user-controlled key (CVSS 4.3).

Authentication Bypass Kanboard
NVD GitHub
EPSS 0% CVSS 8.1
HIGH This Week

Fortios versions up to 7.6.4 contains a vulnerability that allows attackers to an unauthenticated attacker to bypass LDAP authentication of Agentless VPN or FS (CVSS 8.1).

Fortinet Fortigate Ldap +2
NVD
EPSS 44% 4.5 CVSS 8.6
HIGH KEV THREAT Act Now

Ivanti Endpoint Manager before 2024 SU5 contains an authentication bypass (CVE-2026-1603, CVSS 8.6) that allows unauthenticated remote attackers to leak stored credential data. KEV-listed with EPSS 43.9%, this vulnerability exposes credentials stored in the endpoint management platform — potentially including service accounts, deployment credentials, and other secrets used to manage the entire endpoint fleet.

Ivanti Authentication Bypass Endpoint Manager
NVD
EPSS 0% CVSS 8.8
HIGH This Week

Dinibh Puzzle Software Solutions Dinibh Patrol Tracking System is affected by authorization bypass through user-controlled key (CVSS 8.8).

Authentication Bypass
NVD
EPSS 0% CVSS 8.7
HIGH This Week

Sarman Soft Software and Technology Services Industry and Trade Ltd. Co. CMS contains a security vulnerability (CVSS 8.7).

Authentication Bypass
NVD
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Authentication bypass in Apache Druid versions 0.17.0 through 35.x. Affects all versions prior to 36.0.0 when specific prerequisites are met.

Apache Dns Ldap +2
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

A vulnerability has been identified in syngo.plaza VB30E (All versions < VB30E_HF07). The affected application does not encrypt the passwords properly. [CVSS 5.3 MEDIUM]

Authentication Bypass
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

Missing authentication in Flowring Agentflow allows unauthenticated attackers to read, modify, and delete data. Second auth bypass CVE.

Authentication Bypass AI / ML Agentflow
NVD
EPSS 1% CVSS 9.8
CRITICAL Act Now

Authentication bypass in Flowring Agentflow workflow system allows unauthenticated remote attackers to exploit specific functions. EPSS 0.63%.

Authentication Bypass Agentflow
NVD
EPSS 0% CVSS 5.7
MEDIUM This Month

An insecure direct object reference allowed a non-admin user to modify or remove certain data objects without having the appropriate permissions. [CVSS 5.7 MEDIUM]

Authentication Bypass Camera Station Pro
NVD
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

FUXA SCADA has an authentication spoofing vulnerability from versions 1.2.8 through 1.2.10 — tenth critical vulnerability.

Scada Authentication Bypass Fuxa
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

FUXA SCADA has yet another authorization bypass — now the seventh critical FUXA vulnerability discovered, enabling unauthenticated access to industrial controls.

Scada Authentication Bypass Fuxa
NVD GitHub
EPSS 0% CVSS 8.1
HIGH POC PATCH This Week

Path normalization bypass in Filebrowser prior to 2.57.1 allows authenticated users to circumvent file access restrictions by injecting multiple slashes into request URLs, enabling unauthorized access to files designated as restricted. The vulnerability exploits a mismatch between the authorization validation logic and filesystem path resolution, affecting users running vulnerable versions. Public exploit code exists for this high-severity issue.

Authentication Bypass Filebrowser Suse
NVD GitHub
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Unauthenticated message injection in PolarLearn 0-PRERELEASE-16 and earlier allows remote attackers to send persistent messages to arbitrary group chats via the WebSocket API without credentials. Public exploit code exists for this vulnerability, which affects all users of vulnerable versions by enabling spam and potential information manipulation within group communications.

Authentication Bypass Polarlearn
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL Act Now

PlaciPy has an incorrect authorization allowing privilege escalation — seventh and final critical vulnerability.

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 9.1
CRITICAL Act Now

PlaciPy has an incorrect authorization vulnerability — fifth of seven critical flaws.

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Hollo versions prior to 0.6.20 and 0.7.2 improperly expose direct messages and followers-only posts through the ActivityPub outbox endpoint, allowing unauthenticated remote attackers to access sensitive user communications. Public exploit code exists for this authorization bypass vulnerability, enabling attackers to enumerate and retrieve private content intended for restricted audiences. Patched versions 0.6.20 and 0.7.2 are available to remediate the exposure.

Authentication Bypass Hollo
NVD GitHub
Prev Page 23 of 85 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy