Authentication Bypass

7654 CVEs technique

Monthly

CVE-2026-25885 HIGH POC PATCH This Week

Unauthenticated message injection in PolarLearn 0-PRERELEASE-16 and earlier allows remote attackers to send persistent messages to arbitrary group chats via the WebSocket API without credentials. Public exploit code exists for this vulnerability, which affects all users of vulnerable versions by enabling spam and potential information manipulation within group communications.

Authentication Bypass Polarlearn
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25875 CRITICAL Act Now

PlaciPy has an incorrect authorization allowing privilege escalation — seventh and final critical vulnerability.

Authentication Bypass Placipy
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25811 CRITICAL Act Now

PlaciPy has an incorrect authorization vulnerability — fifth of seven critical flaws.

Authentication Bypass Placipy
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-25808 HIGH POC PATCH This Week

Hollo versions prior to 0.6.20 and 0.7.2 improperly expose direct messages and followers-only posts through the ActivityPub outbox endpoint, allowing unauthenticated remote attackers to access sensitive user communications. Public exploit code exists for this authorization bypass vulnerability, enabling attackers to enumerate and retrieve private content intended for restricted audiences. Patched versions 0.6.20 and 0.7.2 are available to remediate the exposure.

Authentication Bypass Hollo
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25878 PHP MEDIUM PATCH This Month

Froshadminer versions up to 2.2.1 is affected by missing authentication for critical function (CVSS 5.3).

Authentication Bypass Froshadminer
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-25876 CRITICAL Act Now

PlaciPy has another missing authorization vulnerability — fourth of seven critical security flaws.

Authentication Bypass Placipy
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-25810 CRITICAL Act Now

PlaciPy has a missing authorization vulnerability — third of seven critical security flaws.

Authentication Bypass Placipy
NVD GitHub
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-25809 CRITICAL Act Now

PlaciPy placement system 1.0.0 has an improper authorization vulnerability enabling unauthenticated admin access — second of seven critical PlaciPy vulnerabilities.

Authentication Bypass Placipy
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-25806 MEDIUM This Month

PlaciPy is a placement management system designed for educational institutions. [CVSS 6.5 MEDIUM]

Authentication Bypass Placipy
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-25479 PyPI MEDIUM POC PATCH This Month

Litestar versions before 2.20.0 improperly escape regex metacharacters in the allowed_hosts middleware, allowing attackers to bypass hostname validation by supplying hosts that match the compiled regex pattern but differ from intended literal hostnames. Public exploit code exists for this vulnerability. The flaw affects the ASGI framework's ability to properly restrict incoming requests to authorized hosts.

Authentication Bypass Litestar
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-25231 HIGH POC This Week

Unauthenticated directory traversal in FileRise prior to version 3.3.0 allows remote attackers to read arbitrary files from the /uploads directory without authentication by directly accessing guessable file paths. Public exploit code exists for this vulnerability, enabling attackers to expose sensitive data and breach user privacy. No patch is currently available.

Authentication Bypass Information Disclosure Filerise
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-24900 MEDIUM PATCH This Month

Markus versions up to 2.9.1 is affected by authorization bypass through user-controlled key (CVSS 6.5).

Authentication Bypass Markus
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-1529 Maven HIGH PATCH This Week

Keycloak's invitation token validation fails to cryptographically verify JWT payload modifications, allowing authenticated attackers to alter organization IDs and email addresses to register into unauthorized organizations. This enables unauthorized access to organizations without proper authentication, affecting any Keycloak deployment using the invitation feature. No patch is currently available.

Authentication Bypass Redhat
NVD
CVSS 3.1
8.1
EPSS
0.0%
CVE-2026-24777 MEDIUM This Month

Insufficient permission validation in OpenProject prior to 17.0.2 allows users with the Manage Users permission to lock and unlock application administrators, a capability that should be restricted to administrators only. An authenticated attacker with user management privileges can exploit this to lock out admin accounts and potentially disrupt system administration capabilities. No patch is currently available for affected versions.

Authentication Bypass Openproject
NVD GitHub
CVSS 3.1
6.7
EPSS
0.1%
CVE-2026-24095 This Week

Improper permission enforcement in Checkmk versions 2.4.0 versions up to 2.4.0 is affected by missing authorization.

Authentication Bypass
NVD
EPSS
0.0%
CVE-2025-10463 HIGH This Week

Birtech Information Technologies Industry and Trade Ltd. Co. Senseway is affected by improper authentication (CVSS 7.3).

Authentication Bypass
NVD
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-25848 CRITICAL Act Now

JetBrains Hub before 2025.3.119807 has an authentication bypass allowing administrative actions without proper credentials.

Authentication Bypass Hub
NVD
CVSS 3.1
9.1
EPSS
0.0%
CVE-2026-23903 Maven MEDIUM PATCH This Month

Authentication Bypass by Alternate Name vulnerability in Apache Shiro. This issue affects Apache Shiro: before 2.0.7. [CVSS 5.3 MEDIUM]

macOS Apache Authentication Bypass Shiro Redhat
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2026-2234 CRITICAL Act Now

HGiga C&Cm@il email system has a missing authentication vulnerability allowing unauthenticated remote access to email server functions.

Authentication Bypass
NVD
CVSS 3.1
9.1
EPSS
0.1%
CVE-2026-22906 CRITICAL Act Now

A device stores user credentials using AES-ECB encryption with a hard-coded key, allowing any attacker to decrypt all stored passwords.

Authentication Bypass
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-22905 HIGH This Week

Insufficient URI validation in CGI endpoints permits unauthenticated attackers to bypass authentication controls through path traversal techniques, enabling direct access to protected administrative functions and configuration files. An attacker can exploit this remotely without credentials to retrieve sensitive data and potentially modify system settings. No patch is currently available for this vulnerability.

Authentication Bypass Path Traversal
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-22613 MEDIUM This Month

Improper server identity validation in Eaton Network M3 firmware upgrade functionality enables man-in-the-middle attacks by network-adjacent threat actors with high privileges. An attacker can intercept and manipulate firmware updates to inject malicious code, compromise system integrity, or disrupt availability. No patch is currently available for this medium-severity issue.

Authentication Bypass
NVD
CVSS 3.1
5.7
EPSS
0.0%
CVE-2026-2174 HIGH This Week

Improper authentication in the CRUD endpoint of code-projects Contact Management System 1.0 allows unauthenticated remote attackers to manipulate ID parameters and bypass access controls. This vulnerability enables unauthorized users to read, modify, or delete sensitive contact data without valid credentials. No patch is currently available.

Authentication Bypass Contact Management System
NVD VulDB
CVSS 3.1
7.3
EPSS
0.0%
CVE-2026-2146 MEDIUM POC This Month

Unrestricted file upload in Yshopmall up to version 1.9.1 allows authenticated attackers to upload arbitrary files via manipulation of the updateAvatar function in the FileUtil component. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. The vendor has not yet released a patch despite early notification.

File Upload Authentication Bypass Yshopmall
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.0%
CVE-2026-2208 MEDIUM PATCH This Month

Wekan versions up to 8.20 contain an authorization bypass in the Rules Handler component that allows authenticated remote attackers to access unauthorized information through the rules.js file. The vulnerability requires valid credentials but no user interaction, enabling low-impact confidentiality breaches. Upgrading to version 8.21 resolves this issue.

Authentication Bypass Wekan
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-25859 HIGH PATCH This Week

Wekan before version 8.20 fails to properly validate user permissions on migration functions, allowing authenticated non-admin users to execute unauthorized migration operations. This vulnerability affects any Wekan deployment and could be exploited by low-privileged users to compromise data integrity or availability. A patch is available.

Authentication Bypass Wekan
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-25568 MEDIUM PATCH This Month

Wekan versions before 8.19 fail to properly enforce the allowPrivateOnly configuration setting during board creation, allowing authenticated users to create public boards when only private boards should be permitted. This authorization bypass enables users to circumvent intended access control policies and expose board data beyond the intended scope. A patch is available for affected installations.

Authentication Bypass Wekan
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-25567 MEDIUM PATCH This Month

Wekan versions up to 8.19 is affected by authorization bypass through user-controlled key (CVSS 4.3).

Authentication Bypass Wekan
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-25566 MEDIUM PATCH This Month

WeKan versions prior to 8.19 contain an authorization vulnerability in card move logic. [CVSS 5.4 MEDIUM]

Authentication Bypass Wekan
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-25565 MEDIUM PATCH This Month

Wekan prior to version 8.19 improperly validates permissions on card update API endpoints, checking only read access instead of requiring write permissions. This allows read-only users to modify cards they should not be able to edit. A patch is available to address this authorization bypass.

Authentication Bypass Wekan
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-25564 HIGH PATCH This Week

Wekan versions up to 8.19 is affected by authorization bypass through user-controlled key (CVSS 7.5).

Authentication Bypass Wekan
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25563 HIGH PATCH This Week

Wekan versions up to 8.19 is affected by authorization bypass through user-controlled key (CVSS 7.5).

Authentication Bypass Wekan
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25561 HIGH PATCH This Week

WeKan versions prior to 8.19 contain an authorization weakness in the attachment upload API. [CVSS 7.5 HIGH]

Authentication Bypass Wekan
NVD GitHub
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-1675 MEDIUM This Month

Advanced Country Blocker (WordPress plugin) versions up to 2.3.1 contains a security vulnerability (CVSS 5.3).

WordPress Authentication Bypass
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2020-37157 HIGH POC This Week

DBPower C300 HD Camera contains a configuration disclosure vulnerability that allows unauthenticated attackers to retrieve sensitive credentials through an unprotected configuration backup endpoint. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2020-37146 HIGH POC This Week

ACE Security WiP-90113 HD Camera contains a configuration disclosure vulnerability that allows unauthenticated attackers to retrieve sensitive configuration files. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2020-37135 HIGH POC This Week

AMSS++ 4.7 contains an authentication bypass vulnerability that allows attackers to access administrative accounts using hardcoded credentials. Attackers can log in with the default admin username and password '1234' to gain unauthorized administrative access to the system. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.0%
CVE-2026-25803 CRITICAL Act Now

3DP-MANAGER for 3x-ui has hard-coded credentials (CVSS 9.8) in version 2.0.1 that provide automatic access to the management interface.

Authentication Bypass 3dp Manager
NVD GitHub VulDB
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-68621 HIGH POC PATCH This Week

Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. [CVSS 7.4 HIGH]

Authentication Bypass Trilium
NVD GitHub
CVSS 3.1
7.4
EPSS
0.1%
CVE-2026-25729 MEDIUM PATCH This Month

DeepAudit is a multi-agent system for code vulnerability discovery. [CVSS 6.5 MEDIUM]

Authentication Bypass AI / ML Deepaudit
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-2065 MEDIUM POC This Month

Smart Pixelator 2.0's Bluetooth Low Energy interface lacks proper authentication controls, allowing unauthenticated attackers on the local network to manipulate device functionality and potentially compromise confidentiality and integrity. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite early notification.

Authentication Bypass Smart Pixelator Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2026-1709 PyPI CRITICAL PATCH Act Now

Keylime attestation framework since version 7.12.0 has a TLS authentication flaw where the registrar doesn't enforce client-side certificate validation.

Authentication Bypass Enterprise Linux For Ibm Z Systems Enterprise Linux For Arm 64 Eus Keylime Enterprise Linux For Power Little Endian +7
NVD
CVSS 3.1
9.4
EPSS
0.0%
CVE-2026-25753 CRITICAL Act Now

PlaciPy placement management system 1.0.0 uses a hard-coded password, allowing any attacker who discovers it to gain full system access.

Authentication Bypass Placipy
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2026-23989 Go HIGH PATCH This Week

Unauthenticated attackers can bypass public link scope verification in OpenCloud Reva versions prior to 2.42.3 and 2.40.3 through a flaw in GRPC authorization middleware. By exploiting the archiver service, an attacker can create archives containing all resources accessible to the public link creator, resulting in unauthorized information disclosure. A patch is available in versions 2.42.3 and 2.40.3.

Authentication Bypass Opencloud Reva Suse
NVD GitHub
CVSS 3.1
8.2
EPSS
0.0%
CVE-2026-24776 MEDIUM This Month

OpenProject versions prior to 17.0.2 fail to validate meeting section ownership during drag-and-drop operations, allowing authenticated users to inject agenda items into unrelated meetings. While attackers cannot access unauthorized meeting content, they can add arbitrary agenda items to other meetings to cause confusion or disrupt meeting organization. A patch is available in version 17.0.2.

Authentication Bypass Openproject
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
CVE-2026-23632 Go MEDIUM PATCH This Month

Gogs versions 0.13.3 and earlier fail to enforce write permissions on the repository contents endpoint, allowing attackers with read-only access to modify files, create commits, and execute git push operations. An authenticated user possessing only read permissions can bypass authorization checks and gain unauthorized write access to repository contents. This affects self-hosted Gogs instances and has no patch currently available for affected versions.

Authentication Bypass Gogs Suse
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-70963 Go HIGH POC PATCH This Week

Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative dashboard exposes each user’s long-lived API key directly inside the rendered HTML/JavaScript of the page on every login. [CVSS 7.6 HIGH]

Authentication Bypass Information Disclosure Gophish Suse
NVD GitHub
CVSS 3.1
7.6
EPSS
0.0%
CVE-2025-64175 Go HIGH PATCH This Week

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, Gogs’ 2FA recovery code validation does not scope codes by user, enabling cross-account bypass. [CVSS 8.8 HIGH]

Authentication Bypass Gogs Suse
NVD GitHub
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-24916 MEDIUM This Month

Identity authentication bypass vulnerability in the window module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. [CVSS 5.9 MEDIUM]

Authentication Bypass Harmonyos
NVD
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-1499 HIGH This Week

WP Duplicate WordPress plugin has a missing authorization vulnerability leading to arbitrary file deletion that can destroy the WordPress installation.

WordPress RCE Authentication Bypass Path Traversal File Upload
NVD
CVSS 3.1
8.8
EPSS
0.7%
CVE-2026-23623 MEDIUM This Month

Collabora Online is a collaborative online office suite based on LibreOffice technology. [CVSS 5.3 MEDIUM]

Authentication Bypass
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2026-24302 HIGH This Week

Azure Arc Elevation of Privilege Vulnerability [CVSS 8.6 HIGH]

Microsoft Authentication Bypass
NVD
CVSS 3.1
8.6
EPSS
0.1%
CVE-2025-15342 MEDIUM This Month

Tanium addressed an improper access controls vulnerability in Reputation. [CVSS 4.3 MEDIUM]

Authentication Bypass Reputation
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-15330 HIGH This Week

Tanium addressed an improper input validation vulnerability in Deploy. [CVSS 8.8 HIGH]

Authentication Bypass Deploy
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-15327 MEDIUM This Month

Tanium addressed an improper access controls vulnerability in Deploy. [CVSS 4.3 MEDIUM]

Authentication Bypass Deploy
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-15326 MEDIUM This Month

Tanium addressed an improper access controls vulnerability in Patch. [CVSS 4.3 MEDIUM]

Authentication Bypass Patch
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-15323 LOW Monitor

Tanium addressed an improper certificate validation vulnerability in Tanium Appliance. [CVSS 3.7 LOW]

Authentication Bypass
NVD
CVSS 3.1
3.7
EPSS
0.0%
CVE-2025-15289 LOW Monitor

Tanium addressed an improper access controls vulnerability in Interact. [CVSS 3.1 LOW]

Authentication Bypass
NVD
CVSS 3.1
3.1
EPSS
0.0%
CVE-2026-1707 PyPI HIGH PATCH This Week

Command execution in pgAdmin 4 server mode allows authenticated attackers to bypass restore operation restrictions by extracting the restrict key during PLAIN-format dump file operations and injecting malicious payloads to re-enable meta-commands. An attacker with web interface access can race the restore process in real time to achieve reliable code execution on the pgAdmin host. No patch is currently available for this vulnerability.

Authentication Bypass Pgadmin 4 Suse
NVD GitHub
CVSS 3.1
7.4
EPSS
0.0%
CVE-2025-68121 Go CRITICAL POC PATCH Act Now

Critical certificate validation bypass in Go crypto/tls during session resumption. If ClientCAs or RootCAs fields are mutated between creating the config and resuming a session, the TLS stack uses the modified trust store, potentially accepting certificates from unintended CAs. CVSS 10.0, PoC available, patch available.

Golang Tls Authentication Bypass Go Redhat +1
NVD VulDB
CVSS 3.1
10.0
EPSS
0.0%
CVE-2026-1927 MEDIUM This Month

The Greenshift animation and page builder plugin for WordPress (up to version 12.6) fails to properly validate user capabilities on the greenshift_app_pass_validation() function, allowing authenticated subscribers and above to extract sensitive plugin configuration including stored AI API keys and inject malicious scripts through the custom_css setting. This combination of information disclosure and stored cross-site scripting (XSS) requires only valid WordPress user credentials to exploit, with a partial patch available in version 12.6.

WordPress Authentication Bypass XSS
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-1897 MEDIUM PATCH This Month

WeKan versions up to 8.20 contain an authorization bypass in the position history tracking functionality that allows authenticated remote attackers to access sensitive information without proper permissions. The vulnerability exists in the server/methods/positionHistory.js file and can be exploited by any user with login credentials. Upgrading to version 8.21 or later resolves this issue.

Authentication Bypass Wekan
NVD GitHub VulDB
CVSS 3.1
4.3
EPSS
0.0%
CVE-2019-25288 HIGH POC This Week

Wacom WTabletService 6.6.7-3 contains an unquoted service path vulnerability that allows local attackers to execute malicious code with elevated privileges. Attackers can insert an executable file in the service path to run unauthorized code when the service restarts or the system reboots. [CVSS 7.8 HIGH]

Authentication Bypass
NVD Exploit-DB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-25519 HIGH PATCH This Week

OpenSlides versions prior to 4.2.29 allow unauthorized authentication bypass for SAML-synchronized users through the local login form by using the victim's username with a hardcoded trivial password. An attacker can gain complete access to any SAML user account without knowing their actual credentials, potentially compromising sensitive assembly management data including agendas, motions, and election information. A patch is available in version 4.2.29 and should be applied immediately to all affected instances.

Authentication Bypass Openslides
NVD GitHub
CVSS 3.1
8.1
EPSS
0.1%
CVE-2026-0948 PHP MEDIUM PATCH This Month

The Microsoft Entra ID SSO Login module for Drupal before version 1.0.4 contains an authentication bypass vulnerability that allows unauthenticated attackers to escalate privileges through an alternate authentication channel. An attacker can exploit this flaw to gain unauthorized access with elevated permissions on affected Drupal installations. No patch is currently available, and the vulnerability has low exploit probability (EPSS 0.1%).

Drupal Privilege Escalation Authentication Bypass Microsoft Entra Id Sso Login
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2026-25505 PyPI CRITICAL POC PATCH Act Now

Bambuddy 3D printer management system has missing authentication (CVSS 9.8) allowing unauthenticated access to printer control and print archive.

Authentication Bypass Bambuddy
NVD GitHub
CVSS 3.1
9.8
EPSS
0.2%
CVE-2025-70997 MEDIUM POC This Month

A vulnerability has been discovered in eladmin v2.7 and before. This vulnerability allows for an arbitrary user password reset under any user permission level. [CVSS 6.5 MEDIUM]

Authentication Bypass Eladmin
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-0679 MEDIUM This Month

Unauthenticated attackers can manipulate WooCommerce order statuses through an authorization bypass in the Fortis for WooCommerce plugin (versions up to 1.2.0), allowing them to fraudulently mark orders as paid without receiving payment. The vulnerability stems from an inverted nonce validation check in the payment notification handler that fails to properly authenticate requests. This affects all WordPress sites running the vulnerable plugin and has no available patch.

WordPress Authentication Bypass
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-15507 MEDIUM This Month

The Magic Import Document Extractor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_sync_usage() function in all versions up to, and including, 1.0.4. [CVSS 5.3 MEDIUM]

WordPress Authentication Bypass
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-15285 HIGH This Week

The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the checkBlogAuthentication() and checkCategoryAuthentication() functions in all versions up to, and including, 2.2.1. [CVSS 7.5 HIGH]

WordPress Authentication Bypass
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-15260 MEDIUM This Month

Loyalty Points and Rewards for WooCommerce versions up to 5.6.0. is affected by missing authorization (CVSS 6.5).

WordPress Authentication Bypass
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-14461 MEDIUM This Month

The Xendit Payment plugin for WordPress is vulnerable to unauthorized order status manipulation in all versions up to, and including, 6.0.2. This is due to the plugin exposing a publicly accessible WooCommerce API callback endpoint (`wc_xendit_callback`) that processes payment callbacks without any authentication or cryptographic verification that the requests originate from Xendit's payment gateway. This makes it possible for unauthenticated attackers to mark any WooCommerce order as paid by...

WordPress Authentication Bypass
NVD
CVSS 3.1
5.3
EPSS
0.2%
CVE-2026-20978 MEDIUM This Month

Android versions up to 13.0 contains a vulnerability that allows attackers to bypass the persistence configuration of the application (CVSS 6.1).

Authentication Bypass Android
NVD
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-20977 MEDIUM This Month

Android versions up to 14.0 contains a vulnerability that allows attackers to interrupt its functioning (CVSS 5.5).

Authentication Bypass Android
NVD
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-1633 CRITICAL Act Now

Synectix LAN 232 TRIO serial-to-ethernet adapter exposes its web management interface without authentication (CVSS 10.0), enabling unauthenticated control of serial devices.

IoT Authentication Bypass
NVD GitHub
CVSS 3.1
10.0
EPSS
0.1%
CVE-2026-1632 CRITICAL Act Now

MOMA Seismic Station v2.4.2520 exposes its web management interface without authentication, allowing unauthenticated control of seismological monitoring equipment.

Authentication Bypass
NVD GitHub
CVSS 3.1
9.1
EPSS
0.2%
CVE-2026-25150 npm CRITICAL PATCH Act Now

Qwik JavaScript framework prior to 1.19.0 has a prototype pollution vulnerability that can lead to server-side code execution in SSR applications.

Denial Of Service Privilege Escalation Authentication Bypass Qwik
NVD GitHub
CVSS 3.1
9.3
EPSS
0.1%
CVE-2026-1341 This Week

Avation Light Engine Pro exposes its configuration and control interface without any authentication or access control.

Authentication Bypass
NVD
EPSS
0.0%
CVE-2020-37094 CRITICAL POC Act Now

EspoCRM 5.8.5 has an authentication vulnerability allowing attackers to access other user accounts through IDOR in session handling.

Authentication Bypass Espocrm
NVD Exploit-DB
CVSS 3.1
9.8
EPSS
0.4%
CVE-2020-37092 HIGH POC This Week

Netis E1+ version 1.2.32533 contains a hardcoded root account vulnerability that allows unauthenticated attackers to access the device with predefined credentials. Attackers can leverage the embedded root account with a crackable password to gain full administrative access to the network device. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-10878 CRITICAL POC Act Now

AdminPando 1.0.1 by Fikir Odalari has a CVSS 10.0 SQL injection in the login functionality allowing complete authentication bypass and database takeover.

SQLi Authentication Bypass Fikir Odalari Adminpando
NVD GitHub
CVSS 3.1
10.0
EPSS
0.1%
CVE-2025-62501 HIGH This Week

Archer Ax53 Firmware versions up to 1.0 contains a vulnerability that allows attackers to obtain device credentials through a specially crafted man‑in‑the‑middle (MITM) a (CVSS 8.1).

TP-Link Authentication Bypass Archer Ax53 Firmware
NVD VulDB
CVSS 3.1
8.1
EPSS
0.0%
CVE-2025-52633 LOW Monitor

HCL AION is affected by a Permanent Cookie Containing Sensitive Session Information vulnerability. It is storing sensitive session data in persistent cookies may increase the risk of unauthorized access if the cookies are intercepted or compromised. [CVSS 3.1 LOW]

Authentication Bypass
NVD
CVSS 3.1
3.1
EPSS
0.0%
CVE-2025-52623 LOW Monitor

HCL AION is affected by an Autocomplete HTML Attribute Not Disabled for Password Field vulnerability. This can allow autocomplete on password fields may lead to unintended storage or disclosure of sensitive credentials, potentially increasing the risk of unauthorized access. [CVSS 3.7 LOW]

Authentication Bypass
NVD
CVSS 3.1
3.7
EPSS
0.0%
CVE-2026-24773 HIGH POC This Week

Open Eclass Platform versions up to 4.2 is affected by authorization bypass through user-controlled key (CVSS 7.5).

Authentication Bypass Open Eclass Platform
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2026-24670 MEDIUM POC This Month

Broken access control in Open eClass Platform versions prior to 4.2 allows authenticated students to create course units, a privilege normally reserved for instructors and administrators. An attacker with valid student credentials can escalate their capabilities within the platform by performing unauthorized administrative actions. Public exploit code exists for this vulnerability, and no patch is currently available.

Authentication Bypass Open Eclass Platform
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-24669 HIGH POC This Week

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. [CVSS 7.8 HIGH]

Authentication Bypass Open Eclass Platform
NVD GitHub
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-24668 MEDIUM POC This Month

Broken access control in Open eClass Platform before version 4.2 allows authenticated students to modify course content that should only be editable by instructors and administrators. Public exploit code exists for this vulnerability, and no patch is currently available for affected deployments. An attacker with valid student credentials can escalate their privileges to alter course materials and potentially disrupt educational content integrity.

Authentication Bypass Open Eclass Platform
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-24667 MEDIUM This Month

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. [CVSS 5.0 MEDIUM]

Authentication Bypass Open Eclass Platform
NVD GitHub
CVSS 3.1
5.0
EPSS
0.0%
CVE-2025-70841 CRITICAL POC Act Now

Dokans SaaS e-commerce platform v3.9.2 has a CVSS 10.0 authentication bypass allowing unauthenticated attackers to obtain sensitive application secrets and tenant data.

Laravel Authentication Bypass Dokans
NVD GitHub
CVSS 3.1
10.0
EPSS
0.1%
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Unauthenticated message injection in PolarLearn 0-PRERELEASE-16 and earlier allows remote attackers to send persistent messages to arbitrary group chats via the WebSocket API without credentials. Public exploit code exists for this vulnerability, which affects all users of vulnerable versions by enabling spam and potential information manipulation within group communications.

Authentication Bypass Polarlearn
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL Act Now

PlaciPy has an incorrect authorization allowing privilege escalation — seventh and final critical vulnerability.

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 9.1
CRITICAL Act Now

PlaciPy has an incorrect authorization vulnerability — fifth of seven critical flaws.

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Hollo versions prior to 0.6.20 and 0.7.2 improperly expose direct messages and followers-only posts through the ActivityPub outbox endpoint, allowing unauthenticated remote attackers to access sensitive user communications. Public exploit code exists for this authorization bypass vulnerability, enabling attackers to enumerate and retrieve private content intended for restricted audiences. Patched versions 0.6.20 and 0.7.2 are available to remediate the exposure.

Authentication Bypass Hollo
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Froshadminer versions up to 2.2.1 is affected by missing authentication for critical function (CVSS 5.3).

Authentication Bypass Froshadminer
NVD GitHub
EPSS 0% CVSS 9.1
CRITICAL Act Now

PlaciPy has another missing authorization vulnerability — fourth of seven critical security flaws.

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 9.1
CRITICAL Act Now

PlaciPy has a missing authorization vulnerability — third of seven critical security flaws.

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL Act Now

PlaciPy placement system 1.0.0 has an improper authorization vulnerability enabling unauthenticated admin access — second of seven critical PlaciPy vulnerabilities.

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM This Month

PlaciPy is a placement management system designed for educational institutions. [CVSS 6.5 MEDIUM]

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Litestar versions before 2.20.0 improperly escape regex metacharacters in the allowed_hosts middleware, allowing attackers to bypass hostname validation by supplying hosts that match the compiled regex pattern but differ from intended literal hostnames. Public exploit code exists for this vulnerability. The flaw affects the ASGI framework's ability to properly restrict incoming requests to authorized hosts.

Authentication Bypass Litestar
NVD GitHub
EPSS 0% CVSS 7.5
HIGH POC This Week

Unauthenticated directory traversal in FileRise prior to version 3.3.0 allows remote attackers to read arbitrary files from the /uploads directory without authentication by directly accessing guessable file paths. Public exploit code exists for this vulnerability, enabling attackers to expose sensitive data and breach user privacy. No patch is currently available.

Authentication Bypass Information Disclosure Filerise
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Markus versions up to 2.9.1 is affected by authorization bypass through user-controlled key (CVSS 6.5).

Authentication Bypass Markus
NVD GitHub
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Keycloak's invitation token validation fails to cryptographically verify JWT payload modifications, allowing authenticated attackers to alter organization IDs and email addresses to register into unauthorized organizations. This enables unauthorized access to organizations without proper authentication, affecting any Keycloak deployment using the invitation feature. No patch is currently available.

Authentication Bypass Redhat
NVD
EPSS 0% CVSS 6.7
MEDIUM This Month

Insufficient permission validation in OpenProject prior to 17.0.2 allows users with the Manage Users permission to lock and unlock application administrators, a capability that should be restricted to administrators only. An authenticated attacker with user management privileges can exploit this to lock out admin accounts and potentially disrupt system administration capabilities. No patch is currently available for affected versions.

Authentication Bypass Openproject
NVD GitHub
EPSS 0%
This Week

Improper permission enforcement in Checkmk versions 2.4.0 versions up to 2.4.0 is affected by missing authorization.

Authentication Bypass
NVD
EPSS 0% CVSS 7.3
HIGH This Week

Birtech Information Technologies Industry and Trade Ltd. Co. Senseway is affected by improper authentication (CVSS 7.3).

Authentication Bypass
NVD
EPSS 0% CVSS 9.1
CRITICAL Act Now

JetBrains Hub before 2025.3.119807 has an authentication bypass allowing administrative actions without proper credentials.

Authentication Bypass Hub
NVD
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Authentication Bypass by Alternate Name vulnerability in Apache Shiro. This issue affects Apache Shiro: before 2.0.7. [CVSS 5.3 MEDIUM]

macOS Apache Authentication Bypass +2
NVD
EPSS 0% CVSS 9.1
CRITICAL Act Now

HGiga C&Cm@il email system has a missing authentication vulnerability allowing unauthenticated remote access to email server functions.

Authentication Bypass
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

A device stores user credentials using AES-ECB encryption with a hard-coded key, allowing any attacker to decrypt all stored passwords.

Authentication Bypass
NVD
EPSS 0% CVSS 7.5
HIGH This Week

Insufficient URI validation in CGI endpoints permits unauthenticated attackers to bypass authentication controls through path traversal techniques, enabling direct access to protected administrative functions and configuration files. An attacker can exploit this remotely without credentials to retrieve sensitive data and potentially modify system settings. No patch is currently available for this vulnerability.

Authentication Bypass Path Traversal
NVD
EPSS 0% CVSS 5.7
MEDIUM This Month

Improper server identity validation in Eaton Network M3 firmware upgrade functionality enables man-in-the-middle attacks by network-adjacent threat actors with high privileges. An attacker can intercept and manipulate firmware updates to inject malicious code, compromise system integrity, or disrupt availability. No patch is currently available for this medium-severity issue.

Authentication Bypass
NVD
EPSS 0% CVSS 7.3
HIGH This Week

Improper authentication in the CRUD endpoint of code-projects Contact Management System 1.0 allows unauthenticated remote attackers to manipulate ID parameters and bypass access controls. This vulnerability enables unauthorized users to read, modify, or delete sensitive contact data without valid credentials. No patch is currently available.

Authentication Bypass Contact Management System
NVD VulDB
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Unrestricted file upload in Yshopmall up to version 1.9.1 allows authenticated attackers to upload arbitrary files via manipulation of the updateAvatar function in the FileUtil component. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. The vendor has not yet released a patch despite early notification.

File Upload Authentication Bypass Yshopmall
NVD GitHub VulDB
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Wekan versions up to 8.20 contain an authorization bypass in the Rules Handler component that allows authenticated remote attackers to access unauthorized information through the rules.js file. The vulnerability requires valid credentials but no user interaction, enabling low-impact confidentiality breaches. Upgrading to version 8.21 resolves this issue.

Authentication Bypass Wekan
NVD GitHub VulDB
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Wekan before version 8.20 fails to properly validate user permissions on migration functions, allowing authenticated non-admin users to execute unauthorized migration operations. This vulnerability affects any Wekan deployment and could be exploited by low-privileged users to compromise data integrity or availability. A patch is available.

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Wekan versions before 8.19 fail to properly enforce the allowPrivateOnly configuration setting during board creation, allowing authenticated users to create public boards when only private boards should be permitted. This authorization bypass enables users to circumvent intended access control policies and expose board data beyond the intended scope. A patch is available for affected installations.

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Wekan versions up to 8.19 is affected by authorization bypass through user-controlled key (CVSS 4.3).

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

WeKan versions prior to 8.19 contain an authorization vulnerability in card move logic. [CVSS 5.4 MEDIUM]

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Wekan prior to version 8.19 improperly validates permissions on card update API endpoints, checking only read access instead of requiring write permissions. This allows read-only users to modify cards they should not be able to edit. A patch is available to address this authorization bypass.

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Wekan versions up to 8.19 is affected by authorization bypass through user-controlled key (CVSS 7.5).

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Wekan versions up to 8.19 is affected by authorization bypass through user-controlled key (CVSS 7.5).

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 7.5
HIGH PATCH This Week

WeKan versions prior to 8.19 contain an authorization weakness in the attachment upload API. [CVSS 7.5 HIGH]

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM This Month

Advanced Country Blocker (WordPress plugin) versions up to 2.3.1 contains a security vulnerability (CVSS 5.3).

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 7.5
HIGH POC This Week

DBPower C300 HD Camera contains a configuration disclosure vulnerability that allows unauthenticated attackers to retrieve sensitive credentials through an unprotected configuration backup endpoint. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
EPSS 0% CVSS 7.5
HIGH POC This Week

ACE Security WiP-90113 HD Camera contains a configuration disclosure vulnerability that allows unauthenticated attackers to retrieve sensitive configuration files. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
EPSS 0% CVSS 7.5
HIGH POC This Week

AMSS++ 4.7 contains an authentication bypass vulnerability that allows attackers to access administrative accounts using hardcoded credentials. Attackers can log in with the default admin username and password '1234' to gain unauthorized administrative access to the system. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
EPSS 0% CVSS 9.8
CRITICAL Act Now

3DP-MANAGER for 3x-ui has hard-coded credentials (CVSS 9.8) in version 2.0.1 that provide automatic access to the management interface.

Authentication Bypass 3dp Manager
NVD GitHub VulDB
EPSS 0% CVSS 7.4
HIGH POC PATCH This Week

Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. [CVSS 7.4 HIGH]

Authentication Bypass Trilium
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

DeepAudit is a multi-agent system for code vulnerability discovery. [CVSS 6.5 MEDIUM]

Authentication Bypass AI / ML Deepaudit
NVD GitHub
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Smart Pixelator 2.0's Bluetooth Low Energy interface lacks proper authentication controls, allowing unauthenticated attackers on the local network to manipulate device functionality and potentially compromise confidentiality and integrity. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite early notification.

Authentication Bypass Smart Pixelator Firmware
NVD GitHub VulDB
EPSS 0% CVSS 9.4
CRITICAL PATCH Act Now

Keylime attestation framework since version 7.12.0 has a TLS authentication flaw where the registrar doesn't enforce client-side certificate validation.

Authentication Bypass Enterprise Linux For Ibm Z Systems Enterprise Linux For Arm 64 Eus +9
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

PlaciPy placement management system 1.0.0 uses a hard-coded password, allowing any attacker who discovers it to gain full system access.

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 8.2
HIGH PATCH This Week

Unauthenticated attackers can bypass public link scope verification in OpenCloud Reva versions prior to 2.42.3 and 2.40.3 through a flaw in GRPC authorization middleware. By exploiting the archiver service, an attacker can create archives containing all resources accessible to the public link creator, resulting in unauthorized information disclosure. A patch is available in versions 2.42.3 and 2.40.3.

Authentication Bypass Opencloud Reva Suse
NVD GitHub
EPSS 0% CVSS 4.3
MEDIUM This Month

OpenProject versions prior to 17.0.2 fail to validate meeting section ownership during drag-and-drop operations, allowing authenticated users to inject agenda items into unrelated meetings. While attackers cannot access unauthorized meeting content, they can add arbitrary agenda items to other meetings to cause confusion or disrupt meeting organization. A patch is available in version 17.0.2.

Authentication Bypass Openproject
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Gogs versions 0.13.3 and earlier fail to enforce write permissions on the repository contents endpoint, allowing attackers with read-only access to modify files, create commits, and execute git push operations. An authenticated user possessing only read permissions can bypass authorization checks and gain unauthorized write access to repository contents. This affects self-hosted Gogs instances and has no patch currently available for affected versions.

Authentication Bypass Gogs Suse
NVD GitHub
EPSS 0% CVSS 7.6
HIGH POC PATCH This Week

Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative dashboard exposes each user’s long-lived API key directly inside the rendered HTML/JavaScript of the page on every login. [CVSS 7.6 HIGH]

Authentication Bypass Information Disclosure Gophish +1
NVD GitHub
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, Gogs’ 2FA recovery code validation does not scope codes by user, enabling cross-account bypass. [CVSS 8.8 HIGH]

Authentication Bypass Gogs Suse
NVD GitHub
EPSS 0% CVSS 5.9
MEDIUM This Month

Identity authentication bypass vulnerability in the window module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. [CVSS 5.9 MEDIUM]

Authentication Bypass Harmonyos
NVD
EPSS 1% CVSS 8.8
HIGH This Week

WP Duplicate WordPress plugin has a missing authorization vulnerability leading to arbitrary file deletion that can destroy the WordPress installation.

WordPress RCE Authentication Bypass +2
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

Collabora Online is a collaborative online office suite based on LibreOffice technology. [CVSS 5.3 MEDIUM]

Authentication Bypass
NVD GitHub
EPSS 0% CVSS 8.6
HIGH This Week

Azure Arc Elevation of Privilege Vulnerability [CVSS 8.6 HIGH]

Microsoft Authentication Bypass
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

Tanium addressed an improper access controls vulnerability in Reputation. [CVSS 4.3 MEDIUM]

Authentication Bypass Reputation
NVD
EPSS 0% CVSS 8.8
HIGH This Week

Tanium addressed an improper input validation vulnerability in Deploy. [CVSS 8.8 HIGH]

Authentication Bypass Deploy
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

Tanium addressed an improper access controls vulnerability in Deploy. [CVSS 4.3 MEDIUM]

Authentication Bypass Deploy
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

Tanium addressed an improper access controls vulnerability in Patch. [CVSS 4.3 MEDIUM]

Authentication Bypass Patch
NVD
EPSS 0% CVSS 3.7
LOW Monitor

Tanium addressed an improper certificate validation vulnerability in Tanium Appliance. [CVSS 3.7 LOW]

Authentication Bypass
NVD
EPSS 0% CVSS 3.1
LOW Monitor

Tanium addressed an improper access controls vulnerability in Interact. [CVSS 3.1 LOW]

Authentication Bypass
NVD
EPSS 0% CVSS 7.4
HIGH PATCH This Week

Command execution in pgAdmin 4 server mode allows authenticated attackers to bypass restore operation restrictions by extracting the restrict key during PLAIN-format dump file operations and injecting malicious payloads to re-enable meta-commands. An attacker with web interface access can race the restore process in real time to achieve reliable code execution on the pgAdmin host. No patch is currently available for this vulnerability.

Authentication Bypass Pgadmin 4 Suse
NVD GitHub
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

Critical certificate validation bypass in Go crypto/tls during session resumption. If ClientCAs or RootCAs fields are mutated between creating the config and resuming a session, the TLS stack uses the modified trust store, potentially accepting certificates from unintended CAs. CVSS 10.0, PoC available, patch available.

Golang Tls Authentication Bypass +3
NVD VulDB
EPSS 0% CVSS 5.4
MEDIUM This Month

The Greenshift animation and page builder plugin for WordPress (up to version 12.6) fails to properly validate user capabilities on the greenshift_app_pass_validation() function, allowing authenticated subscribers and above to extract sensitive plugin configuration including stored AI API keys and inject malicious scripts through the custom_css setting. This combination of information disclosure and stored cross-site scripting (XSS) requires only valid WordPress user credentials to exploit, with a partial patch available in version 12.6.

WordPress Authentication Bypass XSS
NVD
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

WeKan versions up to 8.20 contain an authorization bypass in the position history tracking functionality that allows authenticated remote attackers to access sensitive information without proper permissions. The vulnerability exists in the server/methods/positionHistory.js file and can be exploited by any user with login credentials. Upgrading to version 8.21 or later resolves this issue.

Authentication Bypass Wekan
NVD GitHub VulDB
EPSS 0% CVSS 7.8
HIGH POC This Week

Wacom WTabletService 6.6.7-3 contains an unquoted service path vulnerability that allows local attackers to execute malicious code with elevated privileges. Attackers can insert an executable file in the service path to run unauthorized code when the service restarts or the system reboots. [CVSS 7.8 HIGH]

Authentication Bypass
NVD Exploit-DB
EPSS 0% CVSS 8.1
HIGH PATCH This Week

OpenSlides versions prior to 4.2.29 allow unauthorized authentication bypass for SAML-synchronized users through the local login form by using the victim's username with a hardcoded trivial password. An attacker can gain complete access to any SAML user account without knowing their actual credentials, potentially compromising sensitive assembly management data including agendas, motions, and election information. A patch is available in version 4.2.29 and should be applied immediately to all affected instances.

Authentication Bypass Openslides
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

The Microsoft Entra ID SSO Login module for Drupal before version 1.0.4 contains an authentication bypass vulnerability that allows unauthenticated attackers to escalate privileges through an alternate authentication channel. An attacker can exploit this flaw to gain unauthorized access with elevated permissions on affected Drupal installations. No patch is currently available, and the vulnerability has low exploit probability (EPSS 0.1%).

Drupal Privilege Escalation Authentication Bypass +1
NVD
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Bambuddy 3D printer management system has missing authentication (CVSS 9.8) allowing unauthenticated access to printer control and print archive.

Authentication Bypass Bambuddy
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM POC This Month

A vulnerability has been discovered in eladmin v2.7 and before. This vulnerability allows for an arbitrary user password reset under any user permission level. [CVSS 6.5 MEDIUM]

Authentication Bypass Eladmin
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM This Month

Unauthenticated attackers can manipulate WooCommerce order statuses through an authorization bypass in the Fortis for WooCommerce plugin (versions up to 1.2.0), allowing them to fraudulently mark orders as paid without receiving payment. The vulnerability stems from an inverted nonce validation check in the payment notification handler that fails to properly authenticate requests. This affects all WordPress sites running the vulnerable plugin and has no available patch.

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

The Magic Import Document Extractor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_sync_usage() function in all versions up to, and including, 1.0.4. [CVSS 5.3 MEDIUM]

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 7.5
HIGH This Week

The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the checkBlogAuthentication() and checkCategoryAuthentication() functions in all versions up to, and including, 2.2.1. [CVSS 7.5 HIGH]

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

Loyalty Points and Rewards for WooCommerce versions up to 5.6.0. is affected by missing authorization (CVSS 6.5).

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

The Xendit Payment plugin for WordPress is vulnerable to unauthorized order status manipulation in all versions up to, and including, 6.0.2. This is due to the plugin exposing a publicly accessible WooCommerce API callback endpoint (`wc_xendit_callback`) that processes payment callbacks without any authentication or cryptographic verification that the requests originate from Xendit's payment gateway. This makes it possible for unauthenticated attackers to mark any WooCommerce order as paid by...

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 6.1
MEDIUM This Month

Android versions up to 13.0 contains a vulnerability that allows attackers to bypass the persistence configuration of the application (CVSS 6.1).

Authentication Bypass Android
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

Android versions up to 14.0 contains a vulnerability that allows attackers to interrupt its functioning (CVSS 5.5).

Authentication Bypass Android
NVD
EPSS 0% CVSS 10.0
CRITICAL Act Now

Synectix LAN 232 TRIO serial-to-ethernet adapter exposes its web management interface without authentication (CVSS 10.0), enabling unauthenticated control of serial devices.

IoT Authentication Bypass
NVD GitHub
EPSS 0% CVSS 9.1
CRITICAL Act Now

MOMA Seismic Station v2.4.2520 exposes its web management interface without authentication, allowing unauthenticated control of seismological monitoring equipment.

Authentication Bypass
NVD GitHub
EPSS 0% CVSS 9.3
CRITICAL PATCH Act Now

Qwik JavaScript framework prior to 1.19.0 has a prototype pollution vulnerability that can lead to server-side code execution in SSR applications.

Denial Of Service Privilege Escalation Authentication Bypass +1
NVD GitHub
EPSS 0%
This Week

Avation Light Engine Pro exposes its configuration and control interface without any authentication or access control.

Authentication Bypass
NVD
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

EspoCRM 5.8.5 has an authentication vulnerability allowing attackers to access other user accounts through IDOR in session handling.

Authentication Bypass Espocrm
NVD Exploit-DB
EPSS 0% CVSS 7.5
HIGH POC This Week

Netis E1+ version 1.2.32533 contains a hardcoded root account vulnerability that allows unauthenticated attackers to access the device with predefined credentials. Attackers can leverage the embedded root account with a crackable password to gain full administrative access to the network device. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
EPSS 0% CVSS 10.0
CRITICAL POC Act Now

AdminPando 1.0.1 by Fikir Odalari has a CVSS 10.0 SQL injection in the login functionality allowing complete authentication bypass and database takeover.

SQLi Authentication Bypass Fikir Odalari Adminpando
NVD GitHub
EPSS 0% CVSS 8.1
HIGH This Week

Archer Ax53 Firmware versions up to 1.0 contains a vulnerability that allows attackers to obtain device credentials through a specially crafted man‑in‑the‑middle (MITM) a (CVSS 8.1).

TP-Link Authentication Bypass Archer Ax53 Firmware
NVD VulDB
EPSS 0% CVSS 3.1
LOW Monitor

HCL AION is affected by a Permanent Cookie Containing Sensitive Session Information vulnerability. It is storing sensitive session data in persistent cookies may increase the risk of unauthorized access if the cookies are intercepted or compromised. [CVSS 3.1 LOW]

Authentication Bypass
NVD
EPSS 0% CVSS 3.7
LOW Monitor

HCL AION is affected by an Autocomplete HTML Attribute Not Disabled for Password Field vulnerability. This can allow autocomplete on password fields may lead to unintended storage or disclosure of sensitive credentials, potentially increasing the risk of unauthorized access. [CVSS 3.7 LOW]

Authentication Bypass
NVD
EPSS 0% CVSS 7.5
HIGH POC This Week

Open Eclass Platform versions up to 4.2 is affected by authorization bypass through user-controlled key (CVSS 7.5).

Authentication Bypass Open Eclass Platform
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Broken access control in Open eClass Platform versions prior to 4.2 allows authenticated students to create course units, a privilege normally reserved for instructors and administrators. An attacker with valid student credentials can escalate their capabilities within the platform by performing unauthorized administrative actions. Public exploit code exists for this vulnerability, and no patch is currently available.

Authentication Bypass Open Eclass Platform
NVD GitHub
EPSS 0% CVSS 7.8
HIGH POC This Week

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. [CVSS 7.8 HIGH]

Authentication Bypass Open Eclass Platform
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Broken access control in Open eClass Platform before version 4.2 allows authenticated students to modify course content that should only be editable by instructors and administrators. Public exploit code exists for this vulnerability, and no patch is currently available for affected deployments. An attacker with valid student credentials can escalate their privileges to alter course materials and potentially disrupt educational content integrity.

Authentication Bypass Open Eclass Platform
NVD GitHub
EPSS 0% CVSS 5.0
MEDIUM This Month

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. [CVSS 5.0 MEDIUM]

Authentication Bypass Open Eclass Platform
NVD GitHub
EPSS 0% CVSS 10.0
CRITICAL POC Act Now

Dokans SaaS e-commerce platform v3.9.2 has a CVSS 10.0 authentication bypass allowing unauthenticated attackers to obtain sensitive application secrets and tenant data.

Laravel Authentication Bypass Dokans
NVD GitHub
Prev Page 24 of 86 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy