Authentication Bypass

7723 CVEs technique

Monthly

CVE-2025-7151 MEDIUM POC This Month

A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/voters_add.php. The manipulation of the argument photo leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

File Upload PHP Authentication Bypass Advanced Online Voting System
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-6044 MEDIUM PATCH This Month

An Improper Access Control vulnerability in the Stylus Tools component of Google ChromeOS version 16238.64.0 on the garaged stylus devices allows a physical attacker to bypass the lock screen and access user files by removing the stylus while the device is closed and using the screen capture feature.

Google Authentication Bypass Chrome Os Chrome
NVD
CVSS 3.1
6.1
EPSS
0.0%
CVE-2025-53499 CRITICAL PATCH Act Now

Missing Authorization vulnerability in Wikimedia Foundation Mediawiki - AbuseFilter Extension allows Unauthorized Access.This issue affects Mediawiki - AbuseFilter Extension: from 1.43.X before 1.43.2.

Authentication Bypass
NVD
CVSS 3.1
9.1
EPSS
0.1%
CVE-2025-53495 CRITICAL PATCH Act Now

Missing Authorization vulnerability in Wikimedia Foundation Mediawiki - AbuseFilter Extension allows Unauthorized Access.This issue affects Mediawiki - AbuseFilter Extension: from 1.43.X before 1.43.2.

Authentication Bypass
NVD
CVSS 3.1
9.1
EPSS
0.1%
CVE-2025-20324 MEDIUM PATCH This Month

In Splunk Enterprise versions below 9.4.2, 9.3.5, 9.2.7, and 9.1.10 and Splunk Cloud Platform versions below 9.3.2411.104, 9.3.2408.113, and 9.2.2406.119, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create or overwrite [system source type](https://help.splunk.com/en/splunk-enterprise/get-started/get-data-in/9.2/configure-source-types/create-source-types) configurations by sending a specially-crafted payload to the `/servicesNS/nobody/search/admin/sourcetypes/` REST endpoint on the Splunk management port.

Authentication Bypass Splunk Splunk Cloud Platform
NVD
CVSS 3.1
5.4
EPSS
0.0%
CVE-2025-20323 MEDIUM PATCH This Month

In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a low-privileged user that does not hold the "admin" or "power" Splunk roles could turn off the scheduled search `Bucket Copy Trigger` within the Splunk Archiver application. This is because of missing access controls in the saved searches for this app.

Authentication Bypass Splunk
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-20300 MEDIUM PATCH This Month

In Splunk Enterprise versions below 9.4.2, 9.3.5, 9.2.6, and 9.1.9 and Splunk Cloud Platform versions below 9.3.2411.103, 9.3.2408.112, and 9.2.2406.119, a low-privileged user that does not hold the "admin" or "power" Splunk roles, and has read-only access to a specific alert, could suppress that alert when it triggers. See [Define alert suppression groups to throttle sets of similar alerts](https://help.splunk.com/en/splunk-enterprise/alert-and-respond/alerting-manual/9.4/manage-alert-trigger-conditions-and-throttling/define-alert-suppression-groups-to-throttle-sets-of-similar-alerts).

Authentication Bypass Splunk Splunk Cloud Platform
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-53532 MEDIUM This Month

A security vulnerability in giscus (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD GitHub
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-52492 HIGH This Week

A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services.

Information Disclosure Authentication Bypass
NVD GitHub
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-6713 HIGH PATCH This Week

An unauthorized user may leverage a specially crafted aggregation pipeline to access data without proper authorization due to improper handling of the $mergeCursors stage in MongoDB Server. This may lead to access to data without further authorisation. This issue affects MongoDB Server MongoDB Server v8.0 versions prior to 8.0.7, MongoDB Server v7.0 versions prior to 7.0.19 and MongoDB Server v6.0 versions prior to 6.0.22

Authentication Bypass Ubuntu Debian MongoDB
NVD
CVSS 3.1
7.7
EPSS
0.1%
CVE-2025-7124 MEDIUM POC This Month

A vulnerability classified as critical has been found in code-projects Online Note Sharing 1.0. Affected is an unknown function of the file /dashboard/userprofile.php of the component Profile Image Handler. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

File Upload PHP Authentication Bypass Online Note Sharing
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-3777 PyPI LOW POC PATCH Monitor

Hugging Face Transformers versions up to 4.49.0 are affected by an improper input validation vulnerability in the `image_utils.py` file. The vulnerability arises from insecure URL validation using the `startswith()` method, which can be bypassed through URL username injection. This allows attackers to craft URLs that appear to be from YouTube but resolve to malicious domains, potentially leading to phishing attacks, malware distribution, or data exfiltration. The issue is fixed in version 4.52.1.

Authentication Bypass Hugging Face AI / ML
NVD GitHub
CVSS 3.0
3.5
EPSS
0.0%
CVE-2025-3466 HIGH POC PATCH This Week

CVE-2025-3466 is a security vulnerability (CVSS 7.2). Risk factors: public PoC available. Vendor patch is available.

RCE Authentication Bypass Dify
NVD GitHub
CVSS 3.1
7.2
EPSS
0.2%
CVE-2025-3920 HIGH PATCH This Week

A security vulnerability in A vulnerability (CVSS 8.5). High severity vulnerability requiring prompt remediation.

Authentication Bypass
NVD
CVSS 4.0
8.5
EPSS
0.0%
CVE-2025-7115 HIGH This Week

A vulnerability was found in rowboatlabs rowboat up to 8096eaf63b5a0732edd8f812bee05b78e214ee97. It has been rated as critical. Affected by this issue is the function PUT of the file apps/rowboat/app/api/uploads/[fileId]/route.ts of the component Session Handler. The manipulation of the argument params leads to missing authentication. The attack may be launched remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. It is expected that this issue will be fixed in the near future.

Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.1%
CVE-2025-7114 HIGH POC This Week

A vulnerability was found in SimStudioAI sim up to 37786d371e17d35e0764e1b5cd519d873d90d97b. It has been declared as critical. Affected by this vulnerability is the function POST of the file apps/sim/app/api/files/upload/route.ts of the component Session Handler. The manipulation of the argument Request leads to missing authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Authentication Bypass Sim
NVD GitHub VulDB
CVSS 3.1
7.3
EPSS
0.3%
CVE-2025-53169 HIGH This Week

Vulnerability of bypassing the process to start SA and use related functions on distributed cameras Impact: Successful exploitation of this vulnerability may allow the peer device to use the camera without user awareness.

Authentication Bypass Harmonyos
NVD
CVSS 3.1
7.6
EPSS
0.0%
CVE-2025-53168 MEDIUM This Month

CVE-2025-53168 is a security vulnerability (CVSS 5.7) that allows the peer device. Remediation should follow standard vulnerability management procedures.

Authentication Bypass Harmonyos
NVD
CVSS 3.1
5.7
EPSS
0.0%
CVE-2025-7100 MEDIUM This Month

A vulnerability was found in BoyunCMS up to 1.4.20 and classified as critical. Affected by this issue is some unknown functionality of the file /application/user/controller/Index.php. The manipulation of the argument image leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

File Upload PHP Authentication Bypass Boyuncms
NVD VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-7095 LOW POC Monitor

A vulnerability classified as critical has been found in Comodo Internet Security Premium 12.3.4.8162. This affects an unknown part of the component Update Handler. The manipulation leads to improper certificate validation. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.

Authentication Bypass
NVD VulDB
CVSS 3.1
3.7
EPSS
0.0%
CVE-2025-7080 LOW Monitor

A vulnerability, which was classified as problematic, was found in Done-0 Jank up to 322caebbad10568460364b9667aa62c3080bfc17. Affected is an unknown function of the file internal/utils/jwt_utils.go of the component JWT Token Handler. The manipulation of the argument accessSecret/refreshSecret with the input jank-blog-secret/jank-blog-refresh-secret leads to use of hard-coded password. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.

Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
3.7
EPSS
0.0%
CVE-2025-7079 LOW POC Monitor

A vulnerability, which was classified as problematic, has been found in mao888 bluebell-plus up to 2.3.0. This issue affects some unknown processing of the file bluebell_backend/pkg/jwt/jwt.go of the component JWT Token Handler. The manipulation of the argument mySecret with the input bluebell-plus leads to use of hard-coded password. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.

Authentication Bypass
NVD GitHub VulDB
CVSS 3.1
3.7
EPSS
0.1%
CVE-2025-7075 MEDIUM POC This Month

A vulnerability was found in BlackVue Dashcam 590X up to 20250624. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /upload.cgi of the component HTTP Endpoint. The manipulation leads to unrestricted upload. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

File Upload Authentication Bypass Blackvue Dr590x Firmware
NVD GitHub VulDB
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-47227 HIGH This Week

In the Production Environment extension in Netmake ScriptCase through 9.12.006 (23), the Administrator password reset mechanism is mishandled. Making both a GET and a POST request to login.php.is sufficient. An unauthenticated attacker can then bypass authentication via administrator account takeover.

PHP Authentication Bypass
NVD GitHub
CVSS 3.1
7.5
EPSS
1.1%
CVE-2025-26850 CRITICAL PATCH Act Now

The agent in Quest KACE Systems Management Appliance (SMA) before 14.0.97 and 14.1.x before 14.1.19 potentially allows privilege escalation on managed systems.

Privilege Escalation Authentication Bypass
NVD
CVSS 3.1
9.3
EPSS
0.0%
CVE-2025-48952 CRITICAL POC PATCH Act Now

NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in front/index.php. This introduces a security issue where specially crafted "magic hash" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of `==` instead of the strict `===`, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain "weird" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability.

PHP Authentication Bypass Netalertx
NVD GitHub
CVSS 3.1
9.4
EPSS
0.2%
CVE-2025-53485 HIGH PATCH This Week

A security vulnerability in newer MediaWiki (CVSS 7.5). High severity vulnerability requiring prompt remediation.

PHP Authentication Bypass
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-49600 MEDIUM PATCH This Month

A security vulnerability in MbedTLS 3.3.0 (CVSS 4.9). Remediation should follow standard vulnerability management procedures.

Authentication Bypass Ubuntu Debian Mbed Tls Suse
NVD GitHub
CVSS 3.1
4.9
EPSS
0.0%
CVE-2025-52813 HIGH This Week

A security vulnerability in Missing Authorization vulnerability in pietro MobiLoud (CVSS 8.1). High severity vulnerability requiring prompt remediation.

Authentication Bypass
NVD
CVSS 3.1
8.1
EPSS
0.1%
CVE-2025-50039 MEDIUM This Month

A security vulnerability in Missing Authorization vulnerability in vgwort VG WORT METIS (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-50032 MEDIUM This Month

Missing Authorization vulnerability in Paytiko - Payment Orchestration Platform Paytiko for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Paytiko for WooCommerce: from n/a through 1.3.14.

WordPress Authentication Bypass PHP
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-49431 MEDIUM This Month

Missing Authorization vulnerability in Gnuget MF Plus WPML allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MF Plus WPML: from n/a through 1.1.

Authentication Bypass
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-47634 MEDIUM This Month

Missing Authorization vulnerability in Keylor Mendoza WC Pickup Store allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WC Pickup Store: from n/a through 1.8.9.

Authentication Bypass
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-47565 MEDIUM This Month

A security vulnerability in Missing Authorization vulnerability in ashanjay EventON (CVSS 6.3). Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD
CVSS 3.1
6.3
EPSS
0.1%
CVE-2025-30929 MEDIUM This Month

A security vulnerability in Missing Authorization vulnerability in amazewp fluXtore (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-29012 MEDIUM This Month

A security vulnerability in Missing Authorization vulnerability in kamleshyadav CF7 7 Mailchimp Add-on (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD
CVSS 3.1
5.3
EPSS
0.0%
CVE-2025-29007 MEDIUM This Month

Missing Authorization vulnerability in LMSACE LMSACE Connect allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects LMSACE Connect: from n/a through 3.4.

Authentication Bypass
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-29001 MEDIUM This Month

Missing Authorization vulnerability in ZoomIt WooCommerce Shop Page Builder allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WooCommerce Shop Page Builder: from n/a through 2.27.7.

WordPress Authentication Bypass PHP
NVD
CVSS 3.1
4.3
EPSS
0.0%
CVE-2025-53600 HIGH This Week

Whale browser before 4.32.315.22 allow an attacker to bypass the Same-Origin Policy in a dual-tab environment.

Authentication Bypass Whale
NVD
CVSS 3.1
7.5
EPSS
0.0%
CVE-2025-6814 HIGH This Week

A security vulnerability in Booking X (CVSS 7.5). High severity vulnerability requiring prompt remediation.

WordPress Authentication Bypass PHP
NVD
CVSS 3.1
7.5
EPSS
0.1%
CVE-2025-6786 MEDIUM This Month

A security vulnerability in plugin for WordPress is vulnerable to unauthorized post access in all (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

WordPress Authentication Bypass
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-5956 MEDIUM This Month

The WP Human Resource Management plugin for WordPress is vulnerable to Arbitrary User Deletion due to a missing authorization within the ajax_delete_employee() function in versions 2.0.0 through 2.2.17. The plugin’s deletion handler reads the client-supplied $_POST['delete'] array and passes each ID directly to wp_delete_user() without verifying that the caller has the delete_users capability or limiting which user IDs may be removed. This makes it possible for authenticated attackers, with Employee-level access and above, to delete arbitrary accounts, including administrators.

WordPress Authentication Bypass Wp Human Resource Management PHP
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-5953 HIGH This Week

The WP Human Resource Management plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization in the ajax_insert_employee() and update_empoyee() functions in versions 2.0.0 through 2.2.17. The AJAX handler reads the client-supplied $_POST['role'] and, after basic cleaning via hrm_clean(), passes it directly to wp_insert_user() and later to $user->set_role() without verifying that the current user is allowed to assign that role. This makes it possible for authenticated attackers, with Employee-level access and above, to elevate their privileges to administrator.

WordPress Privilege Escalation Authentication Bypass Wp Human Resource Management PHP
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-52554 npm MEDIUM PATCH This Month

n8n is a workflow automation platform. Prior to version 1.99.1, an authorization vulnerability was discovered in the /rest/executions/:id/stop endpoint of n8n. An authenticated user can stop workflow executions that they do not own or that have not been shared with them, leading to potential business disruption. This issue has been patched in version 1.99.1. A workaround involves restricting access to the /rest/executions/:id/stop endpoint via reverse proxy or API gateway.

Authentication Bypass N8n
NVD GitHub
CVSS 3.1
4.3
EPSS
0.1%
CVE-2025-6926 HIGH PATCH This Week

Improper Authentication vulnerability in Wikimedia Foundation Mediawiki - CentralAuth Extension allows : Bypass Authentication.This issue affects Mediawiki - CentralAuth Extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.

Authentication Bypass Ubuntu Debian
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-6074 MEDIUM This Month

Use of Hard-coded Cryptographic Key vulnerability in ABB RMC-100, ABB RMC-100 LITE. When the REST interface is enabled by the user, and an attacker gains access to source code and control network, the attacker can bypass the REST interface authentication and gain access to MQTT configuration data. This issue affects RMC-100: from 2105457-043 through 2105457-045; RMC-100 LITE: from 2106229-015 through 2106229-016.

Authentication Bypass
NVD
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-53501 HIGH POC PATCH This Week

Improper Access Control vulnerability in Wikimedia Foundation Mediawiki - Scribunto Extension allows : Accessing Functionality Not Properly Constrained by Authorization.This issue affects Mediawiki - Scribunto Extension: from 1.39.X before 1.39.12, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.

Authentication Bypass Scribunto
NVD
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-3702 MEDIUM PATCH This Month

Missing Authorization vulnerability in Melapress Melapress File Monitor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Melapress File Monitor: from n/a before 2.2.0.

Authentication Bypass
NVD
CVSS 3.1
5.4
EPSS
0.1%
CVE-2025-27461 HIGH This Week

During startup, the device automatically logs in the EPC2 Windows user without requesting a password.

Microsoft Authentication Bypass Meac300 Fnade4 Firmware Windows
NVD
CVSS 3.1
7.6
EPSS
0.1%
CVE-2025-6587 MEDIUM PATCH This Month

System environment variables are recorded in Docker Desktop diagnostic logs, when using shell auto-completion. This leads to unintentional disclosure of sensitive information such as api keys, passwords, etc.  A malicious actor with read access to these logs could obtain secrets and further use them to gain unauthorized access to other systems. Starting with version 4.43.0 Docker Desktop no longer logs system environment variables as part of diagnostics log collection.

Authentication Bypass Docker
NVD
CVSS 4.0
5.2
EPSS
0.0%
CVE-2025-0885 LOW Monitor

CVE-2025-0885 is a security vulnerability (CVSS 1.8) that allows unauthorized access. Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD
CVSS 4.0
1.8
EPSS
0.0%
CVE-2025-49713 HIGH POC PATCH This Week

Access of resource using incompatible type ('type confusion') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.

Microsoft Google Memory Corruption Authentication Bypass Edge Chromium +1
NVD GitHub
CVSS 3.1
8.8
EPSS
0.4%
CVE-2025-45813 CRITICAL POC Act Now

ENENSYS IPGuard v2 2.10.0 was discovered to contain hardcoded credentials.

Authentication Bypass Ipguardv2 Firmware
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-45814 CRITICAL POC Act Now

Missing authentication checks in the query.fcgi endpoint of NS3000 v8.1.1.125110 , v7.2.8.124852 , and v7.x and NS2000 v7.02.08 allows attackers to execute a session hijacking attack.

Authentication Bypass Ns3000 Firmware Ns2000 Firmware
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-45424 MEDIUM POC This Month

Incorrect access control in Xinference before v1.4.0 allows attackers to access the Web GUI without authentication.

Authentication Bypass Xinference
NVD GitHub
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-20309 CRITICAL PATCH Act Now

A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted. This vulnerability is due to the presence of static user credentials for the root account that are reserved for use during development. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.

Cisco Authentication Bypass Unified Communications Manager
NVD
CVSS 3.1
10.0
EPSS
0.2%
CVE-2025-6942 LOW PATCH Monitor

CVE-2025-6942 is a security vulnerability (CVSS 3.8) that allows an attacker. Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD
CVSS 3.1
3.8
EPSS
0.0%
CVE-2025-53108 MEDIUM PATCH This Month

A security vulnerability in HomeBox (CVSS 5.3) that allows authenticated users. Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD GitHub
CVSS 4.0
5.3
EPSS
0.1%
CVE-2025-53106 Maven HIGH PATCH This Week

Graylog is a free and open log management platform. In versions 6.2.0 to before 6.2.4 and 6.3.0-alpha.1 to before 6.3.0-rc.2, Graylog users can gain elevated privileges by creating and using API tokens for the local Administrator or any other user for whom the malicious user knows the ID. For the attack to succeed, the attacker needs a user account in Graylog. They can then proceed to issue hand-crafted requests to the Graylog REST API and exploit a weak permission check for token creation. This issue has been patched in versions 6.2.4 and 6.3.0-rc.2. A workaround involves disabling the respective configuration found in System > Configuration > Users > "Allow users to create personal access tokens".

Authentication Bypass Debian Graylog
NVD GitHub
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-34071 CRITICAL POC Act Now

A remote code execution vulnerability in GFI Kerio Control 9.4.5 allows attackers with administrative access to upload and execute arbitrary code through the firmware upgrade feature. The system upgrade mechanism accepts unsigned .img files, which can be modified to include malicious scripts within the upgrade.sh or disk image components. These modified upgrade images are not validated for authenticity or integrity, and are executed by the system post-upload, enabling root access.

RCE Authentication Bypass Kerio Control
NVD
CVSS 3.1
9.8
EPSS
1.0%
CVE-2025-34070 CRITICAL POC Act Now

A missing authentication vulnerability in the GFIAgent component of GFI Kerio Control 9.4.5 allows unauthenticated remote attackers to perform privileged operations. The GFIAgent service, responsible for integration with GFI AppManager, exposes HTTP services on ports 7995 and 7996 without proper authentication. The /proxy handler on port 7996 allows arbitrary forwarding to administrative endpoints when provided with an Appliance UUID, which itself can be retrieved from port 7995. This results in a complete authentication bypass, permitting access to sensitive administrative APIs.

Authentication Bypass Kerio Control
NVD
CVSS 3.1
9.8
EPSS
0.9%
CVE-2025-34069 CRITICAL POC Act Now

An authentication bypass vulnerability exists in GFI Kerio Control 9.4.5 due to insecure default proxy configuration and weak access control in the GFIAgent service. The non-transparent proxy on TCP port 3128 can be used to forward unauthenticated requests to internal services such as GFIAgent, bypassing firewall restrictions and exposing internal management endpoints. This enables unauthenticated attackers to access the GFIAgent service on ports 7995 and 7996, retrieve the appliance UUID, and issue administrative requests via the proxy. Exploitation results in full administrative access to the Kerio Control appliance.

Authentication Bypass Kerio Control
NVD
CVSS 3.1
9.8
EPSS
0.6%
CVE-2025-34057 HIGH This Week

An information disclosure vulnerability exists in Ruijie NBR series routers (known to affect NBR2000G, NBR1300G, and NBR1000 models) via the /WEB_VMS/LEVEL15/ endpoint. By crafting a specific POST request with modified Cookie headers and specially formatted parameters, an unauthenticated attacker can retrieve administrative account credentials in plaintext. This flaw allows direct disclosure of sensitive user data due to improper authentication checks and insecure backend logic. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.

Information Disclosure Authentication Bypass
NVD
CVSS 4.0
8.7
EPSS
0.5%
CVE-2025-39362 MEDIUM This Month

Missing Authorization vulnerability in Mollie Mollie Payments for WooCommerce.This issue affects Mollie Payments for WooCommerce: from n/a through 8.0.2.

WordPress Authentication Bypass PHP
NVD
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-4654 LOW Monitor

A security vulnerability in Soumettre.fr (CVSS 3.7). Remediation should follow standard vulnerability management procedures.

WordPress Authentication Bypass PHP
NVD
CVSS 3.1
3.7
EPSS
0.1%
CVE-2025-5692 MEDIUM PATCH This Month

The Lead Form Data Collection to CRM plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the ~/includes/LB_admin_ajax.php file in all versions up to, and including, 3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform several actions like updating settings. Initially this CVE was assigned specifically to all AJAX actions and the doFieldAjaxAction() function, however it was determined that CVE-2025-47690 is assigned to the doFieldAjaxAction() function that leads to arbitrary options updates.

PHP WordPress Authentication Bypass Lead Form Data Collection To Crm
NVD
CVSS 3.1
6.3
EPSS
0.0%
CVE-2025-52101 CRITICAL Act Now

A remote code execution vulnerability (CVSS 9.8). Critical severity with potential for significant impact on affected systems.

Authentication Bypass
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-46259 MEDIUM PATCH This Month

Missing Authorization vulnerability in POSIMYTH Innovation The Plus Addons for Elementor Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects The Plus Addons for Elementor Pro: from n/a before 6.3.7.

Authentication Bypass
NVD
CVSS 3.1
5.4
EPSS
0.1%
CVE-2025-27153 MEDIUM PATCH This Month

A security vulnerability in is a ticket escalation process helper for GLPI. (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Authentication Bypass
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-52294 MEDIUM This Month

Insufficient validation of the screen lock mechanism in Trust Wallet v8.45 allows physically proximate attackers to bypass the lock screen and view the wallet balance.

Authentication Bypass
NVD
CVSS 3.1
5.7
EPSS
0.0%
CVE-2025-45083 MEDIUM This Month

CVE-2025-45083 is a security vulnerability (CVSS 6.1) that allows attackers. Remediation should follow standard vulnerability management procedures.

Google Apple Authentication Bypass Android iOS
NVD
CVSS 3.1
6.1
EPSS
0.0%
CVE-2025-45081 HIGH This Week

Misconfigured settings in IITB SSO v1.1.0 allow attackers to access sensitive application data.

Authentication Bypass
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2025-50405 MEDIUM POC This Month

Intelbras RX1500 Router v2.2.17 and before is vulnerable to Incorrect Access Control in the FirmwareUpload function and GetFirmwareValidation function.

Authentication Bypass Rx 1500 Firmware
NVD GitHub
CVSS 3.1
6.5
EPSS
0.1%
CVE-2025-34065 MEDIUM POC This Month

An authentication bypass vulnerability exists in AVTECH IP camera, DVR, and NVR devices’ streamd web server. The strstr() function allows unauthenticated access to any request containing "/nobody" in the URL, bypassing login controls.

Authentication Bypass
NVD GitHub Exploit-DB
CVSS 4.0
6.9
EPSS
0.1%
CVE-2025-34063 CRITICAL PATCH Act Now

A cryptographic authentication bypass vulnerability exists in OneLogin AD Connector prior to 6.1.5 due to the exposure of a tenant’s SSO JWT signing key via the /api/adc/v4/configuration endpoint. An attacker in possession of the signing key can craft valid JWT tokens impersonating arbitrary users within a OneLogin tenant. The tokens allow authentication to the OneLogin SSO portal and all downstream applications federated via SAML or OIDC. This allows full unauthorized access across the victim’s SaaS environment.

Authentication Bypass
NVD
CVSS 4.0
10.0
EPSS
0.1%
CVE-2025-34058 HIGH This Week

Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files.

PHP Authentication Bypass Path Traversal Hikvision
NVD
CVSS 4.0
8.7
EPSS
1.2%
CVE-2025-34053 MEDIUM POC This Month

An authentication bypass vulnerability exists in AVTECH IP camera, DVR, and NVR devices’ streamd web server. The strstr() function is used to identify ".cab" requests, allowing any URL containing ".cab" to bypass authentication and access protected endpoints.

Authentication Bypass
NVD GitHub Exploit-DB
CVSS 4.0
6.9
EPSS
0.1%
CVE-2025-6920 MEDIUM This Month

A flaw was found in the authentication enforcement mechanism of a model inference API in ai-inference-server. All /v1/* endpoints are expected to enforce API key validation. However, the POST /invocations endpoint failed to do so, resulting in an authentication bypass. This vulnerability allows unauthorized users to access the same inference features available on protected endpoints, potentially exposing sensitive functionality or allowing unintended access to backend resources.

Authentication Bypass Ai Inference Server Redhat
NVD
CVSS 3.1
5.3
EPSS
0.1%
CVE-2025-41656 CRITICAL Act Now

An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.

Authentication Bypass
NVD
CVSS 3.1
10.0
EPSS
0.3%
CVE-2025-41648 CRITICAL PATCH Act Now

CVE-2025-41648 is a security vulnerability (CVSS 9.8). Critical severity with potential for significant impact on affected systems.

Authentication Bypass
NVD
CVSS 3.1
9.8
EPSS
0.1%
CVE-2024-49365 npm PATCH Monitor

tiny-secp256k1 is a tiny secp256k1 native/JS wrapper. Prior to version 1.1.7, a malicious JSON-stringifyable message can be made passing on verify(), when global Buffer is the buffer package. This affects only environments where require('buffer') is the NPM buffer package. Buffer.isBuffer check can be bypassed, resulting in strange objects being accepted as a message, and those messages could trick verify() into returning false-positive true values. This issue has been patched in version 1.1.7.

Node.js Authentication Bypass
NVD GitHub
EPSS
0.0%
CVE-2024-49364 npm PATCH Monitor

tiny-secp256k1 is a tiny secp256k1 native/JS wrapper. Prior to version 1.1.7, a private key can be extracted on signing a malicious JSON-stringifiable object, when global Buffer is the buffer package. This affects only environments where require('buffer') is the NPM buffer package. The Buffer.isBuffer check can be bypassed, resulting in k reuse for different messages, leading to private key extraction over a single invalid message (and a second one for which any message/signature could be taken, e.g. previously known valid one). This issue has been patched in version 1.1.7.

Node.js Authentication Bypass
NVD GitHub
EPSS
0.1%
CVE-2024-46992 npm HIGH PATCH This Week

A remote code execution vulnerability in Electron (CVSS 7.8). High severity vulnerability requiring prompt remediation.

Microsoft Apple Authentication Bypass Debian Windows +1
NVD GitHub
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-53005 CRITICAL POC PATCH Act Now

A remote code execution vulnerability in DataEase (CVSS 9.8). Risk factors: public PoC available.

Authentication Bypass PostgreSQL Dataease
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-6932 LOW POC Monitor

A vulnerability, which was classified as problematic, was found in D-Link DCS-7517 up to 2.02.0. This affects the function g_F_n_GenPassForQlync of the file /bin/httpd of the component Qlync Password Generation Handler. The manipulation leads to use of hard-coded password. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Authentication Bypass D-Link
NVD VulDB
CVSS 3.1
3.7
EPSS
0.1%
CVE-2025-53004 CRITICAL POC PATCH Act Now

A remote code execution vulnerability in DataEase (CVSS 9.8). Risk factors: public PoC available.

Authentication Bypass Dataease
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-32462 LOW POC PATCH THREAT Monitor

Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.

Authentication Bypass Ubuntu Debian
NVD Exploit-DB
CVSS 3.1
2.8
EPSS
17.4%
CVE-2025-36593 HIGH PATCH This Week

Dell OpenManage Network Integration, versions prior to 3.8, contains an Authentication Bypass by Capture-replay vulnerability in the RADIUS protocol. An attacker with local network access could potentially exploit this vulnerability to forge a valid protocol accept message in response to a failed authentication request.

Dell Authentication Bypass Openmanage Network Integration
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2025-6916 HIGH POC This Week

A vulnerability, which was classified as critical, was found in TOTOLINK T6 4.1.5cu.748_B20211015. This affects the function Form_Login of the file /formLoginAuth.htm. The manipulation of the argument authCode/goURL leads to missing authentication. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used.

Authentication Bypass T6 Firmware TOTOLINK
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.1%
CVE-2025-47871 Go MEDIUM PATCH This Month

Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to properly validate channel membership when retrieving playbook run metadata, allowing authenticated users who are playbook members but not channel members to access sensitive information about linked private channels including channel name, display name, and participant count through the run metadata API endpoint.

Authentication Bypass Debian Mattermost Server Suse
NVD GitHub
CVSS 3.1
4.3
EPSS
0.0%
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/voters_add.php. The manipulation of the argument photo leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

File Upload PHP Authentication Bypass +1
NVD GitHub VulDB
EPSS 0% CVSS 6.1
MEDIUM PATCH This Month

An Improper Access Control vulnerability in the Stylus Tools component of Google ChromeOS version 16238.64.0 on the garaged stylus devices allows a physical attacker to bypass the lock screen and access user files by removing the stylus while the device is closed and using the screen capture feature.

Google Authentication Bypass Chrome Os +1
NVD
EPSS 0% CVSS 9.1
CRITICAL PATCH Act Now

Missing Authorization vulnerability in Wikimedia Foundation Mediawiki - AbuseFilter Extension allows Unauthorized Access.This issue affects Mediawiki - AbuseFilter Extension: from 1.43.X before 1.43.2.

Authentication Bypass
NVD
EPSS 0% CVSS 9.1
CRITICAL PATCH Act Now

Missing Authorization vulnerability in Wikimedia Foundation Mediawiki - AbuseFilter Extension allows Unauthorized Access.This issue affects Mediawiki - AbuseFilter Extension: from 1.43.X before 1.43.2.

Authentication Bypass
NVD
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

In Splunk Enterprise versions below 9.4.2, 9.3.5, 9.2.7, and 9.1.10 and Splunk Cloud Platform versions below 9.3.2411.104, 9.3.2408.113, and 9.2.2406.119, a low-privileged user that does not hold the "admin" or "power" Splunk roles could create or overwrite [system source type](https://help.splunk.com/en/splunk-enterprise/get-started/get-data-in/9.2/configure-source-types/create-source-types) configurations by sending a specially-crafted payload to the `/servicesNS/nobody/search/admin/sourcetypes/` REST endpoint on the Splunk management port.

Authentication Bypass Splunk Splunk Cloud Platform
NVD
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

In Splunk Enterprise versions below 9.4.3, 9.3.5, 9.2.7, and 9.1.10, a low-privileged user that does not hold the "admin" or "power" Splunk roles could turn off the scheduled search `Bucket Copy Trigger` within the Splunk Archiver application. This is because of missing access controls in the saved searches for this app.

Authentication Bypass Splunk
NVD
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

In Splunk Enterprise versions below 9.4.2, 9.3.5, 9.2.6, and 9.1.9 and Splunk Cloud Platform versions below 9.3.2411.103, 9.3.2408.112, and 9.2.2406.119, a low-privileged user that does not hold the "admin" or "power" Splunk roles, and has read-only access to a specific alert, could suppress that alert when it triggers. See [Define alert suppression groups to throttle sets of similar alerts](https://help.splunk.com/en/splunk-enterprise/alert-and-respond/alerting-manual/9.4/manage-alert-trigger-conditions-and-throttling/define-alert-suppression-groups-to-throttle-sets-of-similar-alerts).

Authentication Bypass Splunk Splunk Cloud Platform
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

A security vulnerability in giscus (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD GitHub
EPSS 0% CVSS 7.5
HIGH This Week

A vulnerability has been discovered in the firmware of Paxton Paxton10 before 4.6 SR6. The firmware file, rootfs.tar.gz, contains hard-coded credentials for the Twilio API. A remote attacker who obtains a copy of the firmware can extract these credentials. This could allow the attacker to gain unauthorized access to the associated Twilio account, leading to information disclosure, potential service disruption, and unauthorized use of the Twilio services.

Information Disclosure Authentication Bypass
NVD GitHub
EPSS 0% CVSS 7.7
HIGH PATCH This Week

An unauthorized user may leverage a specially crafted aggregation pipeline to access data without proper authorization due to improper handling of the $mergeCursors stage in MongoDB Server. This may lead to access to data without further authorisation. This issue affects MongoDB Server MongoDB Server v8.0 versions prior to 8.0.7, MongoDB Server v7.0 versions prior to 7.0.19 and MongoDB Server v6.0 versions prior to 6.0.22

Authentication Bypass Ubuntu Debian +1
NVD
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A vulnerability classified as critical has been found in code-projects Online Note Sharing 1.0. Affected is an unknown function of the file /dashboard/userprofile.php of the component Profile Image Handler. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

File Upload PHP Authentication Bypass +1
NVD GitHub VulDB
EPSS 0% CVSS 3.5
LOW POC PATCH Monitor

Hugging Face Transformers versions up to 4.49.0 are affected by an improper input validation vulnerability in the `image_utils.py` file. The vulnerability arises from insecure URL validation using the `startswith()` method, which can be bypassed through URL username injection. This allows attackers to craft URLs that appear to be from YouTube but resolve to malicious domains, potentially leading to phishing attacks, malware distribution, or data exfiltration. The issue is fixed in version 4.52.1.

Authentication Bypass Hugging Face AI / ML
NVD GitHub
EPSS 0% CVSS 7.2
HIGH POC PATCH This Week

CVE-2025-3466 is a security vulnerability (CVSS 7.2). Risk factors: public PoC available. Vendor patch is available.

RCE Authentication Bypass Dify
NVD GitHub
EPSS 0% CVSS 8.5
HIGH PATCH This Week

A security vulnerability in A vulnerability (CVSS 8.5). High severity vulnerability requiring prompt remediation.

Authentication Bypass
NVD
EPSS 0% CVSS 7.3
HIGH This Week

A vulnerability was found in rowboatlabs rowboat up to 8096eaf63b5a0732edd8f812bee05b78e214ee97. It has been rated as critical. Affected by this issue is the function PUT of the file apps/rowboat/app/api/uploads/[fileId]/route.ts of the component Session Handler. The manipulation of the argument params leads to missing authentication. The attack may be launched remotely. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. It is expected that this issue will be fixed in the near future.

Authentication Bypass
NVD GitHub VulDB
EPSS 0% CVSS 7.3
HIGH POC This Week

A vulnerability was found in SimStudioAI sim up to 37786d371e17d35e0764e1b5cd519d873d90d97b. It has been declared as critical. Affected by this vulnerability is the function POST of the file apps/sim/app/api/files/upload/route.ts of the component Session Handler. The manipulation of the argument Request leads to missing authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Authentication Bypass Sim
NVD GitHub VulDB
EPSS 0% CVSS 7.6
HIGH This Week

Vulnerability of bypassing the process to start SA and use related functions on distributed cameras Impact: Successful exploitation of this vulnerability may allow the peer device to use the camera without user awareness.

Authentication Bypass Harmonyos
NVD
EPSS 0% CVSS 5.7
MEDIUM This Month

CVE-2025-53168 is a security vulnerability (CVSS 5.7) that allows the peer device. Remediation should follow standard vulnerability management procedures.

Authentication Bypass Harmonyos
NVD
EPSS 0% CVSS 6.3
MEDIUM This Month

A vulnerability was found in BoyunCMS up to 1.4.20 and classified as critical. Affected by this issue is some unknown functionality of the file /application/user/controller/Index.php. The manipulation of the argument image leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

File Upload PHP Authentication Bypass +1
NVD VulDB
EPSS 0% CVSS 3.7
LOW POC Monitor

A vulnerability classified as critical has been found in Comodo Internet Security Premium 12.3.4.8162. This affects an unknown part of the component Update Handler. The manipulation leads to improper certificate validation. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.

Authentication Bypass
NVD VulDB
EPSS 0% CVSS 3.7
LOW Monitor

A vulnerability, which was classified as problematic, was found in Done-0 Jank up to 322caebbad10568460364b9667aa62c3080bfc17. Affected is an unknown function of the file internal/utils/jwt_utils.go of the component JWT Token Handler. The manipulation of the argument accessSecret/refreshSecret with the input jank-blog-secret/jank-blog-refresh-secret leads to use of hard-coded password. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.

Authentication Bypass
NVD GitHub VulDB
EPSS 0% CVSS 3.7
LOW POC Monitor

A vulnerability, which was classified as problematic, has been found in mao888 bluebell-plus up to 2.3.0. This issue affects some unknown processing of the file bluebell_backend/pkg/jwt/jwt.go of the component JWT Token Handler. The manipulation of the argument mySecret with the input bluebell-plus leads to use of hard-coded password. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.

Authentication Bypass
NVD GitHub VulDB
EPSS 0% CVSS 6.3
MEDIUM POC This Month

A vulnerability was found in BlackVue Dashcam 590X up to 20250624. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /upload.cgi of the component HTTP Endpoint. The manipulation leads to unrestricted upload. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

File Upload Authentication Bypass Blackvue Dr590x Firmware
NVD GitHub VulDB
EPSS 1% CVSS 7.5
HIGH This Week

In the Production Environment extension in Netmake ScriptCase through 9.12.006 (23), the Administrator password reset mechanism is mishandled. Making both a GET and a POST request to login.php.is sufficient. An unauthenticated attacker can then bypass authentication via administrator account takeover.

PHP Authentication Bypass
NVD GitHub
EPSS 0% CVSS 9.3
CRITICAL PATCH Act Now

The agent in Quest KACE Systems Management Appliance (SMA) before 14.0.97 and 14.1.x before 14.1.19 potentially allows privilege escalation on managed systems.

Privilege Escalation Authentication Bypass
NVD
EPSS 0% CVSS 9.4
CRITICAL POC PATCH Act Now

NetAlertX is a network, presence scanner, and alert framework. Prior to version 25.6.7, a vulnerability in the authentication logic allows users to bypass password verification using SHA-256 magic hashes, due to loose comparison in PHP. In vulnerable versions of the application, a password comparison is performed using the `==` operator at line 40 in front/index.php. This introduces a security issue where specially crafted "magic hash" values that evaluate to true in a loose comparison can bypass authentication. Because of the use of `==` instead of the strict `===`, different strings that begin with 0e and are followed by only digits can be interpreted as scientific notation (i.e., zero) and treated as equal. This issue falls under the Login Bypass vulnerability class. Users with certain "weird" passwords that produce magic hashes are particularly affected. Services relying on this logic are at risk of unauthorized access. Version 25.6.7 fixes the vulnerability.

PHP Authentication Bypass Netalertx
NVD GitHub
EPSS 0% CVSS 7.5
HIGH PATCH This Week

A security vulnerability in newer MediaWiki (CVSS 7.5). High severity vulnerability requiring prompt remediation.

PHP Authentication Bypass
NVD
EPSS 0% CVSS 4.9
MEDIUM PATCH This Month

A security vulnerability in MbedTLS 3.3.0 (CVSS 4.9). Remediation should follow standard vulnerability management procedures.

Authentication Bypass Ubuntu Debian +2
NVD GitHub
EPSS 0% CVSS 8.1
HIGH This Week

A security vulnerability in Missing Authorization vulnerability in pietro MobiLoud (CVSS 8.1). High severity vulnerability requiring prompt remediation.

Authentication Bypass
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

A security vulnerability in Missing Authorization vulnerability in vgwort VG WORT METIS (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

Missing Authorization vulnerability in Paytiko - Payment Orchestration Platform Paytiko for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Paytiko for WooCommerce: from n/a through 1.3.14.

WordPress Authentication Bypass PHP
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

Missing Authorization vulnerability in Gnuget MF Plus WPML allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects MF Plus WPML: from n/a through 1.1.

Authentication Bypass
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

Missing Authorization vulnerability in Keylor Mendoza WC Pickup Store allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WC Pickup Store: from n/a through 1.8.9.

Authentication Bypass
NVD
EPSS 0% CVSS 6.3
MEDIUM This Month

A security vulnerability in Missing Authorization vulnerability in ashanjay EventON (CVSS 6.3). Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

A security vulnerability in Missing Authorization vulnerability in amazewp fluXtore (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

A security vulnerability in Missing Authorization vulnerability in kamleshyadav CF7 7 Mailchimp Add-on (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

Missing Authorization vulnerability in LMSACE LMSACE Connect allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects LMSACE Connect: from n/a through 3.4.

Authentication Bypass
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

Missing Authorization vulnerability in ZoomIt WooCommerce Shop Page Builder allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WooCommerce Shop Page Builder: from n/a through 2.27.7.

WordPress Authentication Bypass PHP
NVD
EPSS 0% CVSS 7.5
HIGH This Week

Whale browser before 4.32.315.22 allow an attacker to bypass the Same-Origin Policy in a dual-tab environment.

Authentication Bypass Whale
NVD
EPSS 0% CVSS 7.5
HIGH This Week

A security vulnerability in Booking X (CVSS 7.5). High severity vulnerability requiring prompt remediation.

WordPress Authentication Bypass PHP
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

A security vulnerability in plugin for WordPress is vulnerable to unauthorized post access in all (CVSS 5.3). Remediation should follow standard vulnerability management procedures.

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

The WP Human Resource Management plugin for WordPress is vulnerable to Arbitrary User Deletion due to a missing authorization within the ajax_delete_employee() function in versions 2.0.0 through 2.2.17. The plugin’s deletion handler reads the client-supplied $_POST['delete'] array and passes each ID directly to wp_delete_user() without verifying that the caller has the delete_users capability or limiting which user IDs may be removed. This makes it possible for authenticated attackers, with Employee-level access and above, to delete arbitrary accounts, including administrators.

WordPress Authentication Bypass Wp Human Resource Management +1
NVD
EPSS 0% CVSS 8.8
HIGH This Week

The WP Human Resource Management plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization in the ajax_insert_employee() and update_empoyee() functions in versions 2.0.0 through 2.2.17. The AJAX handler reads the client-supplied $_POST['role'] and, after basic cleaning via hrm_clean(), passes it directly to wp_insert_user() and later to $user->set_role() without verifying that the current user is allowed to assign that role. This makes it possible for authenticated attackers, with Employee-level access and above, to elevate their privileges to administrator.

WordPress Privilege Escalation Authentication Bypass +2
NVD
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

n8n is a workflow automation platform. Prior to version 1.99.1, an authorization vulnerability was discovered in the /rest/executions/:id/stop endpoint of n8n. An authenticated user can stop workflow executions that they do not own or that have not been shared with them, leading to potential business disruption. This issue has been patched in version 1.99.1. A workaround involves restricting access to the /rest/executions/:id/stop endpoint via reverse proxy or API gateway.

Authentication Bypass N8n
NVD GitHub
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Improper Authentication vulnerability in Wikimedia Foundation Mediawiki - CentralAuth Extension allows : Bypass Authentication.This issue affects Mediawiki - CentralAuth Extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.

Authentication Bypass Ubuntu Debian
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

Use of Hard-coded Cryptographic Key vulnerability in ABB RMC-100, ABB RMC-100 LITE. When the REST interface is enabled by the user, and an attacker gains access to source code and control network, the attacker can bypass the REST interface authentication and gain access to MQTT configuration data. This issue affects RMC-100: from 2105457-043 through 2105457-045; RMC-100 LITE: from 2106229-015 through 2106229-016.

Authentication Bypass
NVD
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Improper Access Control vulnerability in Wikimedia Foundation Mediawiki - Scribunto Extension allows : Accessing Functionality Not Properly Constrained by Authorization.This issue affects Mediawiki - Scribunto Extension: from 1.39.X before 1.39.12, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2.

Authentication Bypass Scribunto
NVD
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Missing Authorization vulnerability in Melapress Melapress File Monitor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Melapress File Monitor: from n/a before 2.2.0.

Authentication Bypass
NVD
EPSS 0% CVSS 7.6
HIGH This Week

During startup, the device automatically logs in the EPC2 Windows user without requesting a password.

Microsoft Authentication Bypass Meac300 Fnade4 Firmware +1
NVD
EPSS 0% CVSS 5.2
MEDIUM PATCH This Month

System environment variables are recorded in Docker Desktop diagnostic logs, when using shell auto-completion. This leads to unintentional disclosure of sensitive information such as api keys, passwords, etc.  A malicious actor with read access to these logs could obtain secrets and further use them to gain unauthorized access to other systems. Starting with version 4.43.0 Docker Desktop no longer logs system environment variables as part of diagnostics log collection.

Authentication Bypass Docker
NVD
EPSS 0% CVSS 1.8
LOW Monitor

CVE-2025-0885 is a security vulnerability (CVSS 1.8) that allows unauthorized access. Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD
EPSS 0% CVSS 8.8
HIGH POC PATCH This Week

Access of resource using incompatible type ('type confusion') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.

Microsoft Google Memory Corruption +3
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

ENENSYS IPGuard v2 2.10.0 was discovered to contain hardcoded credentials.

Authentication Bypass Ipguardv2 Firmware
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Missing authentication checks in the query.fcgi endpoint of NS3000 v8.1.1.125110 , v7.2.8.124852 , and v7.x and NS2000 v7.02.08 allows attackers to execute a session hijacking attack.

Authentication Bypass Ns3000 Firmware Ns2000 Firmware
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM POC This Month

Incorrect access control in Xinference before v1.4.0 allows attackers to access the Web GUI without authentication.

Authentication Bypass Xinference
NVD GitHub
EPSS 0% CVSS 10.0
CRITICAL PATCH Act Now

A vulnerability in Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted. This vulnerability is due to the presence of static user credentials for the root account that are reserved for use during development. An attacker could exploit this vulnerability by using the account to log in to an affected system. A successful exploit could allow the attacker to log in to the affected system and execute arbitrary commands as the root user.

Cisco Authentication Bypass Unified Communications Manager
NVD
EPSS 0% CVSS 3.8
LOW PATCH Monitor

CVE-2025-6942 is a security vulnerability (CVSS 3.8) that allows an attacker. Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

A security vulnerability in HomeBox (CVSS 5.3) that allows authenticated users. Remediation should follow standard vulnerability management procedures.

Authentication Bypass
NVD GitHub
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Graylog is a free and open log management platform. In versions 6.2.0 to before 6.2.4 and 6.3.0-alpha.1 to before 6.3.0-rc.2, Graylog users can gain elevated privileges by creating and using API tokens for the local Administrator or any other user for whom the malicious user knows the ID. For the attack to succeed, the attacker needs a user account in Graylog. They can then proceed to issue hand-crafted requests to the Graylog REST API and exploit a weak permission check for token creation. This issue has been patched in versions 6.2.4 and 6.3.0-rc.2. A workaround involves disabling the respective configuration found in System > Configuration > Users > "Allow users to create personal access tokens".

Authentication Bypass Debian Graylog
NVD GitHub
EPSS 1% CVSS 9.8
CRITICAL POC Act Now

A remote code execution vulnerability in GFI Kerio Control 9.4.5 allows attackers with administrative access to upload and execute arbitrary code through the firmware upgrade feature. The system upgrade mechanism accepts unsigned .img files, which can be modified to include malicious scripts within the upgrade.sh or disk image components. These modified upgrade images are not validated for authenticity or integrity, and are executed by the system post-upload, enabling root access.

RCE Authentication Bypass Kerio Control
NVD
EPSS 1% CVSS 9.8
CRITICAL POC Act Now

A missing authentication vulnerability in the GFIAgent component of GFI Kerio Control 9.4.5 allows unauthenticated remote attackers to perform privileged operations. The GFIAgent service, responsible for integration with GFI AppManager, exposes HTTP services on ports 7995 and 7996 without proper authentication. The /proxy handler on port 7996 allows arbitrary forwarding to administrative endpoints when provided with an Appliance UUID, which itself can be retrieved from port 7995. This results in a complete authentication bypass, permitting access to sensitive administrative APIs.

Authentication Bypass Kerio Control
NVD
EPSS 1% CVSS 9.8
CRITICAL POC Act Now

An authentication bypass vulnerability exists in GFI Kerio Control 9.4.5 due to insecure default proxy configuration and weak access control in the GFIAgent service. The non-transparent proxy on TCP port 3128 can be used to forward unauthenticated requests to internal services such as GFIAgent, bypassing firewall restrictions and exposing internal management endpoints. This enables unauthenticated attackers to access the GFIAgent service on ports 7995 and 7996, retrieve the appliance UUID, and issue administrative requests via the proxy. Exploitation results in full administrative access to the Kerio Control appliance.

Authentication Bypass Kerio Control
NVD
EPSS 1% CVSS 8.7
HIGH This Week

An information disclosure vulnerability exists in Ruijie NBR series routers (known to affect NBR2000G, NBR1300G, and NBR1000 models) via the /WEB_VMS/LEVEL15/ endpoint. By crafting a specific POST request with modified Cookie headers and specially formatted parameters, an unauthenticated attacker can retrieve administrative account credentials in plaintext. This flaw allows direct disclosure of sensitive user data due to improper authentication checks and insecure backend logic. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.

Information Disclosure Authentication Bypass
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

Missing Authorization vulnerability in Mollie Mollie Payments for WooCommerce.This issue affects Mollie Payments for WooCommerce: from n/a through 8.0.2.

WordPress Authentication Bypass PHP
NVD
EPSS 0% CVSS 3.7
LOW Monitor

A security vulnerability in Soumettre.fr (CVSS 3.7). Remediation should follow standard vulnerability management procedures.

WordPress Authentication Bypass PHP
NVD
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

The Lead Form Data Collection to CRM plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the ~/includes/LB_admin_ajax.php file in all versions up to, and including, 3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform several actions like updating settings. Initially this CVE was assigned specifically to all AJAX actions and the doFieldAjaxAction() function, however it was determined that CVE-2025-47690 is assigned to the doFieldAjaxAction() function that leads to arbitrary options updates.

PHP WordPress Authentication Bypass +1
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

A remote code execution vulnerability (CVSS 9.8). Critical severity with potential for significant impact on affected systems.

Authentication Bypass
NVD GitHub
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Missing Authorization vulnerability in POSIMYTH Innovation The Plus Addons for Elementor Pro allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects The Plus Addons for Elementor Pro: from n/a before 6.3.7.

Authentication Bypass
NVD
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

A security vulnerability in is a ticket escalation process helper for GLPI. (CVSS 6.5). Remediation should follow standard vulnerability management procedures.

Information Disclosure Authentication Bypass
NVD GitHub
EPSS 0% CVSS 5.7
MEDIUM This Month

Insufficient validation of the screen lock mechanism in Trust Wallet v8.45 allows physically proximate attackers to bypass the lock screen and view the wallet balance.

Authentication Bypass
NVD
EPSS 0% CVSS 6.1
MEDIUM This Month

CVE-2025-45083 is a security vulnerability (CVSS 6.1) that allows attackers. Remediation should follow standard vulnerability management procedures.

Google Apple Authentication Bypass +2
NVD
EPSS 0% CVSS 8.8
HIGH This Week

Misconfigured settings in IITB SSO v1.1.0 allow attackers to access sensitive application data.

Authentication Bypass
NVD
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Intelbras RX1500 Router v2.2.17 and before is vulnerable to Incorrect Access Control in the FirmwareUpload function and GetFirmwareValidation function.

Authentication Bypass Rx 1500 Firmware
NVD GitHub
EPSS 0% CVSS 6.9
MEDIUM POC This Month

An authentication bypass vulnerability exists in AVTECH IP camera, DVR, and NVR devices’ streamd web server. The strstr() function allows unauthenticated access to any request containing "/nobody" in the URL, bypassing login controls.

Authentication Bypass
NVD GitHub Exploit-DB
EPSS 0% CVSS 10.0
CRITICAL PATCH Act Now

A cryptographic authentication bypass vulnerability exists in OneLogin AD Connector prior to 6.1.5 due to the exposure of a tenant’s SSO JWT signing key via the /api/adc/v4/configuration endpoint. An attacker in possession of the signing key can craft valid JWT tokens impersonating arbitrary users within a OneLogin tenant. The tokens allow authentication to the OneLogin SSO portal and all downstream applications federated via SAML or OIDC. This allows full unauthorized access across the victim’s SaaS environment.

Authentication Bypass
NVD
EPSS 1% CVSS 8.7
HIGH This Week

Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files.

PHP Authentication Bypass Path Traversal +1
NVD
EPSS 0% CVSS 6.9
MEDIUM POC This Month

An authentication bypass vulnerability exists in AVTECH IP camera, DVR, and NVR devices’ streamd web server. The strstr() function is used to identify ".cab" requests, allowing any URL containing ".cab" to bypass authentication and access protected endpoints.

Authentication Bypass
NVD GitHub Exploit-DB
EPSS 0% CVSS 5.3
MEDIUM This Month

A flaw was found in the authentication enforcement mechanism of a model inference API in ai-inference-server. All /v1/* endpoints are expected to enforce API key validation. However, the POST /invocations endpoint failed to do so, resulting in an authentication bypass. This vulnerability allows unauthorized users to access the same inference features available on protected endpoints, potentially exposing sensitive functionality or allowing unintended access to backend resources.

Authentication Bypass Ai Inference Server Redhat
NVD
EPSS 0% CVSS 10.0
CRITICAL Act Now

An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.

Authentication Bypass
NVD
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

CVE-2025-41648 is a security vulnerability (CVSS 9.8). Critical severity with potential for significant impact on affected systems.

Authentication Bypass
NVD
EPSS 0%
PATCH Monitor

tiny-secp256k1 is a tiny secp256k1 native/JS wrapper. Prior to version 1.1.7, a malicious JSON-stringifyable message can be made passing on verify(), when global Buffer is the buffer package. This affects only environments where require('buffer') is the NPM buffer package. Buffer.isBuffer check can be bypassed, resulting in strange objects being accepted as a message, and those messages could trick verify() into returning false-positive true values. This issue has been patched in version 1.1.7.

Node.js Authentication Bypass
NVD GitHub
EPSS 0%
PATCH Monitor

tiny-secp256k1 is a tiny secp256k1 native/JS wrapper. Prior to version 1.1.7, a private key can be extracted on signing a malicious JSON-stringifiable object, when global Buffer is the buffer package. This affects only environments where require('buffer') is the NPM buffer package. The Buffer.isBuffer check can be bypassed, resulting in k reuse for different messages, leading to private key extraction over a single invalid message (and a second one for which any message/signature could be taken, e.g. previously known valid one). This issue has been patched in version 1.1.7.

Node.js Authentication Bypass
NVD GitHub
EPSS 0% CVSS 7.8
HIGH PATCH This Week

A remote code execution vulnerability in Electron (CVSS 7.8). High severity vulnerability requiring prompt remediation.

Microsoft Apple Authentication Bypass +3
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

A remote code execution vulnerability in DataEase (CVSS 9.8). Risk factors: public PoC available.

Authentication Bypass PostgreSQL Dataease
NVD GitHub
EPSS 0% CVSS 3.7
LOW POC Monitor

A vulnerability, which was classified as problematic, was found in D-Link DCS-7517 up to 2.02.0. This affects the function g_F_n_GenPassForQlync of the file /bin/httpd of the component Qlync Password Generation Handler. The manipulation leads to use of hard-coded password. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.

Authentication Bypass D-Link
NVD VulDB
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

A remote code execution vulnerability in DataEase (CVSS 9.8). Risk factors: public PoC available.

Authentication Bypass Dataease
NVD GitHub
EPSS 17% CVSS 2.8
LOW POC PATCH THREAT Monitor

Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.

Authentication Bypass Ubuntu Debian
NVD Exploit-DB
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Dell OpenManage Network Integration, versions prior to 3.8, contains an Authentication Bypass by Capture-replay vulnerability in the RADIUS protocol. An attacker with local network access could potentially exploit this vulnerability to forge a valid protocol accept message in response to a failed authentication request.

Dell Authentication Bypass Openmanage Network Integration
NVD
EPSS 0% CVSS 8.8
HIGH POC This Week

A vulnerability, which was classified as critical, was found in TOTOLINK T6 4.1.5cu.748_B20211015. This affects the function Form_Login of the file /formLoginAuth.htm. The manipulation of the argument authCode/goURL leads to missing authentication. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used.

Authentication Bypass T6 Firmware TOTOLINK
NVD GitHub VulDB
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7.x <= 10.7.2, 10.6.x <= 10.6.5 fail to properly validate channel membership when retrieving playbook run metadata, allowing authenticated users who are playbook members but not channel members to access sensitive information about linked private channels including channel name, display name, and participant count through the run metadata API endpoint.

Authentication Bypass Debian Mattermost Server +1
NVD GitHub
Prev Page 54 of 86 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy