Authentication Bypass

auth CRITICAL

Authentication bypass attacks exploit flaws in the verification mechanisms that control access to systems and applications.

How It Works

Authentication bypass attacks exploit flaws in the verification mechanisms that control access to systems and applications. Instead of cracking passwords through brute force, attackers manipulate the authentication process itself to gain unauthorized entry. This typically occurs through one of several pathways: exploiting hardcoded credentials embedded in source code or configuration files, manipulating parameters in authentication requests to skip verification steps, or leveraging broken session management that fails to properly validate user identity.

The attack flow often begins with reconnaissance to identify authentication endpoints and their underlying logic. Attackers may probe for default administrative credentials that were never changed, test whether certain URL paths bypass login requirements entirely, or intercept and modify authentication tokens to escalate privileges. In multi-step authentication processes, flaws in state management can allow attackers to complete only partial verification steps while still gaining full access.

More sophisticated variants exploit single sign-on (SSO) or OAuth implementations where misconfigurations in trust relationships allow attackers to forge authentication assertions. Parameter tampering—such as changing a "role=user" field to "role=admin" in a request—can trick poorly designed systems into granting elevated access without proper verification.

Impact

  • Complete account takeover — attackers gain full control of user accounts, including administrative accounts, without knowing legitimate credentials
  • Unauthorized data access — ability to view, modify, or exfiltrate sensitive information including customer data, financial records, and intellectual property
  • System-wide compromise — admin-level access enables installation of backdoors, modification of security controls, and complete infrastructure takeover
  • Lateral movement — bypassed authentication provides a foothold for moving deeper into networks and accessing additional systems
  • Compliance violations — unauthorized access triggers breach notification requirements and regulatory penalties

Real-World Examples

CrushFTP suffered a critical authentication bypass allowing attackers to access file-sharing functionality without any credentials. The vulnerability enabled direct server-side template injection, leading to remote code execution on affected systems. Attackers actively exploited this in the wild to establish persistent access to enterprise file servers.

Palo Alto's Expedition migration tool contained a flaw permitting attackers to reset administrative credentials without authentication. This allowed complete takeover of the migration environment, potentially exposing network configurations and security policies being transferred between systems.

SolarWinds Web Help Desk (CVE-2024-28987) shipped with hardcoded internal credentials that could not be changed through normal administrative functions. Attackers discovering these credentials gained full administrative access to helpdesk systems containing sensitive organizational information and user data.

Mitigation

  • Implement multi-factor authentication (MFA) — requires attackers to compromise additional verification factors beyond bypassed primary authentication
  • Eliminate hardcoded credentials — use secure credential management systems and rotate all default credentials during deployment
  • Enforce authentication on all endpoints — verify every request requires valid authentication; no "hidden" administrative paths should exist
  • Implement proper session management — use cryptographically secure session tokens, validate on server-side, enforce timeout policies
  • Apply principle of least privilege — limit damage by ensuring even authenticated users only access necessary resources
  • Regular security testing — conduct penetration testing specifically targeting authentication logic and flows

Recent CVEs (7476)

CVE-2026-32104
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

A security vulnerability in StudioCMS (CVSS 5.4). Remediation should follow standard vulnerability management procedures.

Authentication Bypass Studiocms
NVD GitHub VulDB
CVE-2026-32103
EPSS 0% CVSS 6.8
MEDIUM PATCH This Month

Medium severity vulnerability in StudioCMS. The POST /studiocms_api/dashboard/create-reset-link endpoint allows any authenticated user with admin privileges to generate a password reset token for any other user, including the owner account. The handler verifies that the caller is an admin but does not enforce role hierarchy, nor does it validate that the target userId matches the caller's identity. Combined with the POST /studiocms_api/d...

Authentication Bypass Studiocms
NVD GitHub VulDB
CVE-2026-32102
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

OliveTin’s live EventStream broadcasts execution events and action output to authenticated dashboard subscribers without enforcing per-action authorization. A low-privileged authenticated user can receive output from actions they are not allowed to view, resulting in broken access control and sensitive information disclosure. I validated this on OliveTin 3000.10.2. The issue is in the live event streaming path. EventStream() only checks whether the caller may access the dashboard, then registers the user as a stream subscriber: - service/internal/api/api.go:776 After subscription, execution events are broadcast to all connected clients without checking whether each recipient is authorized to view logs for the action: - service/internal/api/api.go:846 OnExecutionStarted - service/internal/api/api.go:869 OnExecutionFinished - service/internal/api/api.go:1047 OnOutputChunk The event payload includes action output through: - service/internal/api/api.go:295 internalLogEntryToPb - service/internal/api/api.go:302 Output By contrast, the normal log APIs do apply per-action authorization checks: - service/internal/api/api.go:518 GetLogs - service/internal/api/api.go:585 GetActionLogs - service/internal/api/api.go:544 isLogEntryAllowed Root cause: - the subscription path enforces only coarse dashboard access - execution callbacks broadcast to every connected client - no per-recipient ACL check is applied before sending action metadata or output I validated the issue using: - an admin user with full ACLs - an alice user with no ACLs - a protected action that outputs TOPSECRET=alpha-bravo-charlie Despite having no relevant ACLs, alice still receives the ExecutionFinished event for the privileged action, including the protected output. Tested version: ``` - 3000.10.2 ``` 1. Fetch and check out 3000.10.2 in a clean worktree: ```bash git -C OliveTin fetch origin tag 3000.10.2 git -C OliveTin worktree add /home/kali/CVE/OliveTin-3000.10.2 3000.10.2 ``` 2. Copy the PoC test into the clean tree: ```bash cp OliveTin/service/internal/api/event_stream_leak_test.go \ OliveTin-3000.10.2/service/internal/api/ ``` 3. Run the targeted PoC test: ```bash cd OliveTin-3000.10.2/service go test ./internal/api -run TestEventStreamLeaksUnauthorizedExecutionOutput -count=1 -timeout 30s -v ``` 4. Optional: save validation output: ```bash go test ./internal/api -run TestEventStreamLeaksUnauthorizedExecutionOutput -count=1 -timeout 30s -v \ 2>&1 | tee /tmp/olivetin_eventstream_3000.10.2.log ``` Observed validation output: ```bash === RUN TestEventStreamLeaksUnauthorizedExecutionOutput time="2026-03-01T04:44:59-05:00" level=info msg="Action requested" actionTitle=secret-action tags="[]" time="2026-03-01T04:44:59-05:00" level=info msg="Action parse args - Before" actionTitle=secret-action cmd="echo 'TOPSECRET=alpha-bravo-charlie'" time="2026-03-01T04:44:59-05:00" level=info msg="Action parse args - After" actionTitle=secret-action cmd="echo 'TOPSECRET=alpha-bravo-charlie'" time="2026-03-01T04:44:59-05:00" level=info msg="Action started" actionTitle=secret-action timeout=1 time="2026-03-01T04:44:59-05:00" level=info msg="Action finished" actionTitle=secret-action exit=0 outputLength=30 timedOut=false --- PASS: TestEventStreamLeaksUnauthorizedExecutionOutput (0.00s) PASS ok github.com/OliveTin/OliveTin/internal/api 0.025s ``` What this proves: - admin can execute the protected action - alice has no ACLs - alice still receives the streamed completion event for the protected action - protected action output is exposed through the event stream This is an authenticated broken access control / information disclosure vulnerability. A low-privileged authenticated user can subscribe to EventStream and receive: - action execution metadata - execution tracking IDs - initiating username - live output chunks - final command output Who is impacted: - multi-user OliveTin deployments - environments where privileged actions produce secrets, tokens, internal system details, or other sensitive operational output - deployments where lower-privileged authenticated users can access the dashboard and subscribe to live events This bypasses intended per-action log/view restrictions for protected actions.

Information Disclosure Authentication Bypass Olivetin
NVD GitHub VulDB
CVE-2026-32101
EPSS 0% CVSS 7.6
HIGH PATCH This Week

High severity vulnerability in StudioCMS. The S3 storage manager's `isAuthorized()` function is declared `async` (returns `Promise<boolean>`) but is called without `await` in both the POST and PUT handlers. Since a Promise object is always truthy in JavaScript, `!isAuthorized(type)` always evaluates to `false`, completely bypassing the authorization check. Any authenticated user with the lowest `visitor` role can upload, delete, rename...

Authentication Bypass Studiocms
NVD GitHub VulDB
CVE-2026-2368
EPSS 0% CVSS 7.1
HIGH This Week

Lenovo Filez fails to properly validate SSL/TLS certificates, enabling network-positioned attackers to intercept traffic and execute arbitrary code on affected systems. An attacker with the ability to perform man-in-the-middle attacks can exploit this weakness to compromise user devices without authentication. No patch is currently available to remediate this vulnerability.

Authentication Bypass RCE
NVD VulDB
CVE-2026-1068
EPSS 0% CVSS 5.3
MEDIUM This Month

Lenovo Filez fails to properly validate SSL/TLS certificates, enabling network-positioned attackers to intercept encrypted communications and extract sensitive user information. The vulnerability requires an adjacent network position and specific conditions to exploit, but affects all users of the application. No patch is currently available.

Authentication Bypass
NVD VulDB
CVE-2025-66956
EPSS 0% CVSS 9.9
CRITICAL Act Now

Insecure access control in Asseco SEE Live 2.0. Remote access to attachments.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-32097
EPSS 0% CVSS 8.8
HIGH This Week

Authenticated users in PingPong versions prior to 7.27.2 can access and delete files beyond their authorization scope, potentially exposing or removing private user files and model outputs. An attacker with valid credentials and thread access can exploit improper access controls to retrieve or delete sensitive data belonging to other users. No patch is currently available for this high-severity vulnerability affecting the AI/ML teaching platform.

Authentication Bypass AI / ML Pingpong
NVD GitHub VulDB
CVE-2026-31889
EPSS 0% CVSS 8.9
HIGH PATCH This Week

Shopware versions before 6.6.10.15 and 6.7.8.1 contain an authentication bypass in the app registration flow that allows attackers to hijack the communication channel between a shop and third-party apps by re-registering with a controlled domain without domain ownership verification. An attacker with knowledge of the app secret can redirect app traffic and intercept API credentials intended for legitimate shops. This vulnerability affects all Shopware installations using the legacy app registration mechanism and currently has no available patch.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-27478
EPSS 0% CVSS 9.1
CRITICAL Act Now

Auth bypass in Unity Catalog 0.4.0 and earlier.

Authentication Bypass AI / ML
NVD GitHub VulDB
CVE-2026-31887
EPSS 0%
PATCH This Week

Shopware is an open commerce platform. versions up to 6.7.8.1 is affected by incorrect authorization.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-31881
EPSS 0% CVSS 7.7
HIGH This Week

Runtipi versions prior to 4.8.0 allow unauthenticated attackers to reset the admin password through an unprotected POST /api/auth/reset-password endpoint, enabling complete account takeover during active password-reset windows. Any remote user can set a new operator password within the 15-minute reset window without authentication or authorization checks. This vulnerability remains unpatched in affected versions.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-31874
EPSS 0% CVSS 9.8
CRITICAL Act Now

Missing auth in Taskosaur project management 1.0.0.

Authentication Bypass
NVD GitHub VulDB
CVE-2019-25486
EPSS 0% CVSS 8.2
HIGH POC This Week

Varient 1.6.1 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the user_id parameter. [CVSS 8.2 HIGH]

SQLi Authentication Bypass
NVD Exploit-DB VulDB
CVE-2019-25483
EPSS 0% CVSS 8.4
HIGH POC This Week

Comtrend AR-5310 GE31-412SSG-C01_R10.A2pG039u.d24k contains a restricted shell escape vulnerability that allows local users to bypass command restrictions by using the command substitution operator $( ). [CVSS 8.4 HIGH]

Authentication Bypass
NVD Exploit-DB VulDB
CVE-2019-25470
EPSS 0% CVSS 7.5
HIGH POC This Week

eWON Firmware versions 12.2 to 13.0 contain an authentication bypass vulnerability that allows attackers with minimal privileges to retrieve sensitive user data by exploiting the wsdReadForm endpoint. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB VulDB
CVE-2026-31872
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Parse Server versions prior to 9.6.0-alpha.6 and 8.6.32 allow attackers to bypass class-level permission restrictions on protected fields by using dot-notation in query and sort parameters, enabling enumeration of sensitive field values through binary oracle attacks. This affects both MongoDB and PostgreSQL deployments and requires no authentication or user interaction. No patch is currently available for affected versions.

Node.js PostgreSQL Authentication Bypass +1
NVD GitHub VulDB
CVE-2026-31867
EPSS 0% CVSS 4.8
MEDIUM PATCH This Month

Craft Commerce versions prior to 4.11.0 and 5.6.0 contain an IDOR vulnerability in the cart functionality that allows unauthenticated attackers to access and modify arbitrary shopping carts by guessing or knowing their 32-character identifiers. The CartController fails to validate cart ownership, enabling attackers to hijack active shopping sessions and potentially access sensitive customer information. No patch is currently available for affected versions.

Authentication Bypass Craft Commerce
NVD GitHub VulDB
CVE-2026-31863
EPSS 0% CVSS 3.6
LOW PATCH Monitor

Anytype Heart is the middleware library for Anytype. The challenge-based authentication for the local gRPC client API can be bypassed, allowing an attacker to gain access without the 4-digit code. [CVSS 3.6 LOW]

Authentication Bypass
NVD GitHub VulDB
CVE-2026-3429
EPSS 0% CVSS 4.2
MEDIUM This Month

Keycloak's Account REST API improperly validates session assurance levels, enabling authenticated attackers with a victim's password to remove MFA/OTP credentials without re-authentication and subsequently register their own authenticator. This allows complete account takeover by bypassing the intended multi-factor authentication protections. The vulnerability affects users relying on MFA as a security control and currently has no available patch.

Authentication Bypass
NVD VulDB
CVE-2026-31839
EPSS 0% CVSS 8.2
HIGH PATCH This Week

Striae versions prior to 3.0.0 allow local attackers to bypass package integrity verification by modifying both the manifest hash and package contents simultaneously, enabling delivery of tampered firearm examination data that passes validation checks. This integrity bypass affects forensic workflows relying on Striae's digital confirmation mechanism. No patch is currently available for affected installations.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-31813
EPSS 0% CVSS 4.8
MEDIUM This Month

Supabase Auth allows remote attackers to hijack user sessions by crafting fraudulent ID tokens when Apple or Azure OAuth providers are configured, enabling unauthorized access to victim accounts without requiring user interaction. An attacker can forge a valid JWT token for any target email address and exchange it at the token endpoint to obtain legitimate session credentials, effectively impersonating arbitrary users. This affects organizations using Supabase with Apple or Azure authentication enabled, with no patch currently available to remediate the vulnerability.

Microsoft Authentication Bypass Apple
NVD GitHub VulDB
CVE-2026-30239
EPSS 0% CVSS 6.5
MEDIUM This Month

Unauthorized budget assignment deletion in OpenProject prior to 17.2.0 allows any authenticated user to remove work package budget associations due to insufficient authorization checks being performed after the deletion operation. This improper access control enables users without proper permissions to manipulate budget data, potentially disrupting project financial tracking and resource allocation. A patch is available in version 17.2.0 and later.

Authentication Bypass Openproject
NVD GitHub VulDB
CVE-2026-30236
EPSS 0% CVSS 4.3
MEDIUM This Month

OpenProject prior to 17.2.0 fails to validate project membership when calculating labor costs in budget planning, allowing authenticated users to enumerate non-member employees' default billing rates. This exposure occurs both when editing budgets directly and through the cost preview calculation endpoint, potentially revealing sensitive salary information to unauthorized project users.

Authentication Bypass Openproject
NVD GitHub VulDB
CVE-2026-1524
EPSS 0%
This Week

An edgecase in SSO implementation in Neo4j Enterprise edition versions prior to version 2026.02 can lead to unauthorised access under the following conditions: If a neo4j admin configures two or more OIDC providers AND configures one or more of them to be an authorization provider AND configures one or more of them to be authentication-only, then those that are authentication-only will also provide authorization. This edgecase becomes a security problem only if the authentication-only provi...

Authentication Bypass
NVD VulDB
CVE-2026-1471
EPSS 0%
This Week

Excessive caching of authentication context in Neo4j Enterprise edition versions up to 2026.01.4 is affected by incorrect authorization.

Authentication Bypass
NVD VulDB
CVE-2025-67039
EPSS 0% CVSS 9.1
CRITICAL Act Now

Critical vulnerability in Lantronix EDS serial device server (EDS5000/EDS3000PS). Multiple injection and auth bypass vulnerabilities in the management interface.

Authentication Bypass
NVD VulDB
CVE-2025-12555
EPSS 0% CVSS 4.3
MEDIUM This Month

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 15.1 versions up to 18.7.6 is affected by incorrect authorization (CVSS 4.3).

Gitlab Authentication Bypass
NVD VulDB
CVE-2026-31892
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Argo Workflows versions 2.9.0 through 4.0.1 (and 3.x before 3.7.11) allow authenticated users to bypass WorkflowTemplate security policies by injecting a podSpecPatch field in workflow submissions, circumventing even strict template referencing controls. An attacker with workflow submission privileges can exploit this to modify pod specifications without security validation, potentially gaining unauthorized access or executing arbitrary code. This vulnerability affects organizations using Kubernetes with Argo Workflows and requires upgrading to versions 4.0.2, 3.7.11 or later to remediate.

Kubernetes Authentication Bypass Argo Workflows
NVD GitHub VulDB
CVE-2026-29777
EPSS 0%
PATCH Monitor

Traefik is an HTTP reverse proxy and load balancer. Prior to 3.6.10, A tenant with write access to an HTTPRoute resource can inject backtick-delimited rule tokens into Traefik's router rule language via unsanitized header or query parameter match values. In shared gateway deployments, this can bypass listener hostname constraints and redirect traffic for victim hostnames to attacker-controlled ...

Authentication Bypass
NVD GitHub VulDB
CVE-2026-28803
EPSS 0% CVSS 6.5
MEDIUM This Month

Open Forms versions prior to 3.3.13 and 3.4.5 allow authenticated attackers to access arbitrary form submissions through submission reference enumeration or manipulation in the cosigning workflow. An attacker with valid credentials can guess or modify cosigner codes to retrieve submissions they should not have access to, resulting in unauthorized information disclosure.

Authentication Bypass Open Forms
NVD GitHub VulDB
CVE-2026-28229
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Auth bypass in Argo Workflows before 4.0.2/3.7.11.

Kubernetes Authentication Bypass Redhat +1
NVD GitHub VulDB
CVE-2026-1663
EPSS 0% CVSS 4.3
MEDIUM This Month

GitLab has remediated an issue in GitLab CE/EE affecting all versions from 14.4 versions up to 18.7.6 is affected by missing authorization (CVSS 4.3).

Gitlab Authentication Bypass
NVD VulDB
CVE-2026-1497
EPSS 0%
This Week

Incorrect resolving of namespaces in composite databases in Neo4j Enterprise edition versions up to 2026.02 is affected by incorrect authorization.

Authentication Bypass
NVD VulDB
CVE-2025-12704
EPSS 0% CVSS 3.5
LOW Monitor

GitLab has remediated an issue in GitLab EE affecting all versions from 18.2 versions up to 18.7.6 is affected by missing authorization (CVSS 3.5).

Gitlab Authentication Bypass
NVD VulDB
CVE-2026-32229
EPSS 0% CVSS 6.8
MEDIUM This Month

JetBrains Hub versions prior to 2026.1 contain an authentication bypass vulnerability where attackers with valid credentials can gain unauthorized access to accounts through sign-in mismatches when SSO is disabled and two-factor authentication is not configured. An authenticated attacker can exploit this to achieve both confidentiality and integrity violations. No patch is currently available for this vulnerability.

Authentication Bypass
NVD VulDB
CVE-2025-67298
EPSS 0% CVSS 8.1
HIGH This Week

An issue in ClasroomIO before v.0.2.6 allows a remote attacker to escalate privileges via the endpoints /api/verify and /rest/v1/profile [CVSS 8.1 HIGH]

Authentication Bypass
NVD GitHub VulDB
CVE-2026-32059
EPSS 0% CVSS 8.8
HIGH PATCH This Week

OpenClaw version 2026.2.22-2 versions up to 2026.2.23 is affected by incorrect authorization (CVSS 8.8).

Authentication Bypass Openclaw
NVD GitHub
CVE-2026-27842
EPSS 0% CVSS 9.8
CRITICAL Act Now

Auth bypass in MR-GM5L-S1/MR-GM5A-L1 devices.

Authentication Bypass
NVD
CVE-2026-24448
EPSS 0% CVSS 9.8
CRITICAL Act Now

Hardcoded credentials in MR-GM5L-S1/MR-GM5A-L1 devices.

Authentication Bypass
NVD
CVE-2026-29515
EPSS 0%
Monitor

embedded SwiFTP FTP server component contains a vulnerability that allows attackers to log in without valid credentials.

Authentication Bypass
NVD GitHub
CVE-2026-23813
EPSS 0% CVSS 9.8
CRITICAL Act Now

Auth bypass in HPE Aruba AOS-CX switch web management.

Authentication Bypass
NVD
CVE-2026-31838
EPSS 0% CVSS 6.9
MEDIUM This Month

Istio versions prior to 1.29.1, 1.28.5, and 1.27.8 are vulnerable to authorization policy bypass through improper Envoy RBAC handling of multi-valued HTTP headers. An attacker can craft requests with multiple header values that cause the authorization engine to evaluate headers differently than intended, allowing unauthorized access to protected microservices. No patch is currently available for this vulnerability.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-31832
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Umbraco CMS versions 14.0.0 through 16.5.0 and 17.0.0-17.2.1 contain an authorization bypass in a backoffice API endpoint that allows authenticated editors to assign domain configurations to content nodes they lack permission to access. An attacker with valid credentials could exploit this to modify domain settings on restricted content, potentially affecting content visibility or routing. The vulnerability affects Umbraco deployments without patches 16.5.1 or 17.2.2 applied.

Authentication Bypass Umbraco Cms
NVD GitHub VulDB
CVE-2026-31821
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Sylius eCommerce framework's cart API endpoint fails to validate cart ownership, allowing unauthenticated attackers to add items to other customers' shopping carts if they possess a valid cart token value. This integrity flaw affects registered users whose carts can be manipulated by external threat actors, potentially leading to fraudulent transactions or operational disruption. The vulnerability is unpatched in versions prior to 2.0.16, 2.1.12, and 2.2.3.

Authentication Bypass Sylius
NVD GitHub VulDB
CVE-2026-31820
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Authenticated users in Sylius eCommerce can access sensitive customer data belonging to other users through unvalidated resource IDs in LiveComponent parameters, including checkout addresses and shopping carts. The vulnerability exists because LiveArg parameters lack ownership validation when loading resources by ID, allowing attackers to enumerate and retrieve private information such as names, contact details, and order information without proper authorization checks.

Authentication Bypass Sylius
NVD GitHub VulDB
CVE-2026-31815
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Unicorn adds modern reactive component functionality to your Django templates. versions up to 0.67.0 is affected by improper access control (CVSS 5.3).

Python Authentication Bypass Unicorn
NVD GitHub VulDB
CVE-2026-28806
EPSS 0% CVSS 9.4
CRITICAL Act Now

Improper Authorization vulnerability in nerves-hub nerves_hub_web allows cross-organization device control via device bulk actions and device update API.

Authentication Bypass
NVD GitHub VulDB
CVE-2026-31801
EPSS 0% CVSS 7.7
HIGH PATCH This Week

Zot registry versions 1.3.0 through 2.1.14 have an authorization bypass in the manifest upload endpoint that allows authenticated users with only create permissions to overwrite the latest tag when it already exists. An attacker with limited write privileges can leverage this flaw to replace the latest image version, potentially distributing malicious container images to downstream consumers. The vulnerability is fixed in version 2.1.15.

Authentication Bypass Zot
NVD GitHub VulDB
CVE-2026-30954
EPSS 0% CVSS 4.3
MEDIUM This Month

LinkAce versions 2.1.0 and earlier allow authenticated users to inappropriately associate other users' private taxonomies with their own links through insufficient authorization checks in the processTaxonomy() method. This enables privilege escalation where attackers can gain unauthorized access to private tags and lists belonging to other users on the same instance. The vulnerability requires valid authentication credentials and has no available patch at this time.

PHP Authentication Bypass Linkace
NVD GitHub VulDB
CVE-2025-70802
EPSS 0% CVSS 8.4
HIGH This Week

Tenda G1V3.1si V16.01.7.8 Firmware V16.01.7.8 was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root. [CVSS 8.4 HIGH]

Authentication Bypass Tenda
NVD GitHub VulDB
CVE-2025-70798
EPSS 0% CVSS 8.4
HIGH This Week

Tenda i24V3.0si V3.0.0.5 Firmware V3.0.0.5 was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root. [CVSS 8.4 HIGH]

Authentication Bypass Tenda
NVD GitHub VulDB
CVE-2026-29792
EPSS 0%
PATCH This Week

Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. From 5.0.0 to before 5.0.42, an unauthenticated attacker can send a crafted GET request directly to /oauth/:provider/callback with a forged profile in the query string. The OAuth service's authentication payload has a fallback chain that reaches params.query (the raw request query) when Gra...

Authentication Bypass
NVD GitHub VulDB
CVE-2026-26308
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Envoy's RBAC filter improperly concatenates duplicate HTTP headers into comma-separated strings instead of validating each value individually, allowing attackers to bypass "Deny" access control policies through header manipulation. This vulnerability affects Envoy versions prior to 1.34.13, 1.35.8, 1.36.5, and 1.37.1, and public exploit code exists. Patches are available for all affected versions.

Authentication Bypass Envoy
NVD GitHub VulDB
CVE-2026-26742
EPSS 0% CVSS 8.1
HIGH POC This Week

PX4 Autopilot versions 1.12.x through 1.15.x can be forced into an unsafe re-arm state when pilots switch to Manual mode and re-arm within 5 seconds of landing, bypassing critical pre-flight safety checks and throttle validation. This allows attackers or malicious pilots to trigger immediate high-thrust takeoff, resulting in loss of aircraft control. Public exploit code exists for this vulnerability and no patch is currently available.

Authentication Bypass Px4 Drone Autopilot
NVD GitHub VulDB
CVE-2026-26741
EPSS 0% CVSS 8.1
HIGH POC This Week

PX4 Autopilot versions 1.12.x through 1.15.x contain a logic flaw in the mode switching mechanism. [CVSS 8.1 HIGH]

Authentication Bypass Px4 Drone Autopilot
NVD GitHub VulDB
CVE-2026-30970
EPSS 0% CVSS 9.1
CRITICAL Act Now

Coral Server has a third missing authorization flaw.

Authentication Bypass AI / ML Coral Server
NVD GitHub VulDB
CVE-2026-30969
EPSS 0% CVSS 9.1
CRITICAL Act Now

Coral Server has an IDOR vulnerability enabling cross-user data access.

Authentication Bypass AI / ML Coral Server
NVD GitHub VulDB
CVE-2026-30968
EPSS 0% CVSS 9.8
CRITICAL Act Now

Coral Server open collaboration platform has a missing authorization enabling unauthenticated access to all collaboration data.

Authentication Bypass AI / ML Coral Server
NVD GitHub VulDB
CVE-2026-30956
EPSS 0% CVSS 9.9
CRITICAL POC PATCH Act Now

OneUptime prior to 10.0.21 has a third authorization bypass enabling low-privileged users to access admin functions.

Authentication Bypass Privilege Escalation Information Disclosure +2
NVD GitHub VulDB
CVE-2026-30945
EPSS 0% CVSS 7.1
HIGH PATCH This Week

StudioCMS prior to version 0.4.0 allows authenticated editors and above to revoke API tokens belonging to any user, including administrators and owners, due to insufficient authorization checks on the DELETE /studiocms_api/dashboard/api-tokens endpoint. An attacker with editor privileges can exploit this to disable critical integrations and automations by revoking tokens of higher-privileged accounts. No patch is currently available for affected versions.

Denial Of Service Authentication Bypass Studiocms
NVD GitHub VulDB
CVE-2026-30944
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Privilege escalation in StudioCMS versions prior to 0.4.0 enables authenticated Editor-level users to generate API tokens for arbitrary accounts, including administrative and owner roles, due to missing authorization validation on the /studiocms_api/dashboard/api-tokens endpoint. An attacker with basic editor privileges can exploit this to gain full administrative access without requiring the target account's credentials. No patch is currently available for affected installations.

Privilege Escalation Authentication Bypass Studiocms
NVD GitHub VulDB
CVE-2026-2742
EPSS 0%
PATCH Monitor

Authentication bypass in Vaadin framework (14.0.0-14.14.0, 23.0.0-23.6.x, and other ranges). The web application framework fails to properly enforce authentication on certain routes.

Spring Authentication Bypass
NVD GitHub VulDB
CVE-2026-2339
EPSS 0% CVSS 7.5
HIGH This Week

TUBITAK BILGEM Software Technologies Research Institute Liderahenk is affected by missing authentication for critical function (CVSS 7.5).

Command Injection Authentication Bypass
NVD VulDB
CVE-2026-26148
EPSS 0% CVSS 8.1
HIGH This Week

Local privilege escalation in Azure Entra ID SSH Login Extension for Linux stems from improper initialization of trusted variables, enabling unauthenticated attackers on affected systems to gain elevated privileges. This high-severity vulnerability (CVSS 8.1) requires local access but can compromise system confidentiality, integrity, and availability across trust boundaries. No patch is currently available.

Authentication Bypass Microsoft Azure Ad Ssh Login Extension For Linux
NVD VulDB
CVE-2026-26141
EPSS 0% CVSS 7.8
HIGH This Week

Improper authentication in Azure Arc allows an authorized attacker to elevate privileges locally. [CVSS 7.8 HIGH]

Authentication Bypass Microsoft Azure Automation Hybrid Worker Windows Extension
NVD VulDB
CVE-2026-26128
EPSS 0% CVSS 7.8
HIGH This Week

Windows SMB Server's authentication mechanism can be bypassed by local authenticated users to gain elevated privileges on affected systems. This high-severity vulnerability (CVSS 7.8) impacts confidentiality, integrity, and availability, though no patch is currently available. Organizations should implement compensating controls and monitor for exploitation attempts targeting this authentication weakness.

Microsoft Authentication Bypass Windows
NVD VulDB
CVE-2026-26117
EPSS 0% CVSS 7.8
HIGH This Week

Privilege escalation in Microsoft Azure Connected Machine Agent on Windows allows local authenticated users to bypass authentication mechanisms and gain elevated system privileges. An attacker with existing local access can exploit alternate authentication paths to escalate their permissions without user interaction. No patch is currently available for this vulnerability affecting Arc Enabled Servers.

Authentication Bypass Microsoft Arc Enabled Servers Azure Connected Machine Agent +1
NVD VulDB
CVE-2026-26113
EPSS 0% CVSS 8.4
HIGH This Week

Unsafe pointer dereference in Microsoft Office, SharePoint Server, and 365 Apps enables local code execution with high privileges on affected systems. An attacker with local access can exploit this memory safety flaw to achieve complete system compromise including data theft and modification. No patch is currently available, leaving users vulnerable until Microsoft releases a security update.

Microsoft Authentication Bypass Sharepoint Server +3
NVD VulDB
CVE-2026-26112
EPSS 0% CVSS 7.8
HIGH This Week

Microsoft Excel and Office products are vulnerable to local code execution through unsafe pointer dereferencing, requiring user interaction to trigger. An attacker with local access can exploit this flaw to achieve arbitrary code execution with full system privileges. No patch is currently available, leaving users of affected Office versions at risk.

Microsoft Authentication Bypass Office Online Server +4
NVD VulDB
CVE-2026-26110
EPSS 0% CVSS 8.4
HIGH This Week

Local code execution in Microsoft Office and 365 Apps stems from a type confusion vulnerability in memory handling that allows unauthenticated attackers to execute arbitrary code with system privileges. The vulnerability affects Office Long Term Servicing Channel deployments and requires only local access with no user interaction to trigger. No patch is currently available, making this a critical risk for organizations running affected Office versions.

Microsoft Authentication Bypass Memory Corruption +3
NVD VulDB
CVE-2026-25190
EPSS 0% CVSS 7.8
HIGH This Week

Untrusted search path in Windows GDI allows an unauthorized attacker to execute code locally. [CVSS 7.8 HIGH]

Authentication Bypass Microsoft Windows Server 2022 23h2 +14
NVD VulDB
CVE-2026-25176
EPSS 0% CVSS 7.8
HIGH This Week

Windows Ancillary Function Driver for WinSock in Windows 10 (all versions) and Windows 11 contains an access control weakness that enables authenticated local attackers to escalate privileges to system level. An attacker with standard user credentials can exploit this flaw to gain elevated rights on affected systems. No patch is currently available for this vulnerability.

Authentication Bypass Microsoft Windows 10 22h2 +14
NVD VulDB
CVE-2026-25169
EPSS 0% CVSS 6.2
MEDIUM This Month

A division by zero flaw in the Microsoft Graphics Component on Windows 10 and Windows 11 systems enables local attackers to trigger a denial of service condition without requiring special privileges or user interaction. The vulnerability affects multiple Windows versions including Windows 10 1607, 22h2 and Windows 11 25h2, 26h1, with no patch currently available.

Microsoft Authentication Bypass Windows 10 1607 +13
NVD VulDB
CVE-2026-24297
EPSS 0% CVSS 6.5
MEDIUM This Month

Windows Kerberos authentication in Server 2012 and Windows 10 (versions 1607, 1809) contains a race condition that enables unauthenticated remote attackers to circumvent security feature protections. The synchronization flaw in concurrent resource access allows attackers to bypass intended security controls without user interaction over the network. No patch is currently available for this vulnerability.

Race Condition Microsoft Authentication Bypass +8
NVD VulDB
CVE-2026-24294
EPSS 0% CVSS 7.8
HIGH This Week

Windows SMB Server authentication bypass across multiple versions (Windows 10 1607, Windows 11 23h2, Windows Server 2012/2025) permits authenticated local users to escalate privileges with high impact to confidentiality, integrity, and availability. The vulnerability stems from improper authentication validation in the SMB service, allowing a local attacker to gain system-level access without user interaction. No patch is currently available, leaving affected systems vulnerable to privilege escalation attacks from any authenticated user.

Microsoft Authentication Bypass Windows
NVD VulDB
CVE-2026-24290
EPSS 0% CVSS 7.8
HIGH This Week

Windows Projected File System in Windows 11 and Server 2022 contains improper access control that enables authenticated local users to escalate privileges to system level. An attacker with valid credentials can exploit this vulnerability to gain elevated permissions without user interaction. Currently, no patch is available to address this issue.

Microsoft Authentication Bypass Windows 11 24h2 +11
NVD VulDB
CVE-2026-23674
EPSS 0% CVSS 7.5
HIGH This Week

Windows MapUrlToZone security bypass in Windows 11 24H2, Windows 10 21H2, and Windows Server 2016/2025 allows unauthenticated remote attackers to circumvent zone-based security restrictions through improper path equivalence resolution. An attacker can exploit this network-accessible vulnerability without user interaction to bypass intended access controls. No patch is currently available for this high-severity vulnerability.

Microsoft Authentication Bypass Windows 11 24h2 +14
NVD VulDB
CVE-2026-23660
EPSS 0% CVSS 7.8
HIGH This Week

Windows Admin Center in Azure Portal contains an access control flaw that enables local authenticated users to escalate their privileges. An attacker with valid credentials can exploit this vulnerability to gain elevated permissions on the system. No patch is currently available for this issue.

Authentication Bypass Microsoft Windows Admin Center +1
NVD VulDB
CVE-2026-23654
EPSS 0% CVSS 8.8
HIGH This Week

Remote code execution in the zero-shot-scfoundation AI/ML framework results from a vulnerable third-party dependency, enabling unauthenticated attackers to execute arbitrary code over the network with minimal user interaction. This high-severity vulnerability affects systems using the affected component, and no patch is currently available.

Authentication Bypass AI / ML Zero Shot Scfoundation
NVD VulDB
CVE-2026-22629
EPSS 0% CVSS 3.7
LOW Monitor

An improper restriction of excessive authentication attempts vulnerability in Fortinet FortiAnalyzer 7.6.0 through 7.6.4, FortiAnalyzer 7.4 all versions, FortiAnalyzer 7.2 all versions, FortiAnalyzer 7.0 all versions, FortiAnalyzer 6.4 all versions, FortiAnalyzer Cloud 7.6.0 through 7.6.4, FortiAnalyzer Cloud 7.4 all versions, FortiAnalyzer Cloud 7.2 all versions, FortiAnalyzer Cloud 7.0 all versions, FortiAnalyzer Cloud 6.4 all versions, FortiManager 7.6.0 through 7.6.4, FortiManager 7.4 all...

Fortinet Authentication Bypass
NVD VulDB
CVE-2026-22628
EPSS 0% CVSS 5.3
MEDIUM This Month

Fortinet FortiSwitchAXFixed versions 1.0.0 through 1.0.1 contain an access control flaw that allows authenticated administrators to execute arbitrary system commands by uploading a malicious SSH configuration file. The vulnerability requires local access and valid admin credentials but poses a risk to organizations where admin accounts may be compromised or where insider threats are a concern. No patch is currently available.

Fortinet Authentication Bypass
NVD VulDB
CVE-2026-22572
EPSS 0% CVSS 7.2
HIGH This Week

MFA bypass in Fortinet FortiManager and FortiAnalyzer 7.2.2-7.6.3 allows attackers with valid admin credentials to disable multifactor authentication through specially crafted repeated requests. This authentication bypass (CWE-288) affects multiple product lines including FortiManager Cloud, creating high risk for unauthorized administrative access. No patch is currently available, leaving affected systems vulnerable to MFA circumvention attacks.

Fortinet Authentication Bypass Fortimanager +2
NVD VulDB
CVE-2026-21262
EPSS 0% CVSS 8.8
HIGH POC This Week

SQL Server 2016-2025 contains an improper access control flaw that allows authenticated network attackers to escalate privileges without user interaction. Public exploit code exists for this vulnerability, which carries a CVSS score of 8.8 and affects confidentiality, integrity, and availability. No patch is currently available.

Authentication Bypass Sql Server 2019 Sql Server 2022 +3
NVD VulDB GitHub
CVE-2025-69615
EPSS 0% CVSS 9.1
CRITICAL Act Now

A product has missing 2FA rate limiting allowing unlimited brute-force attempts against two-factor authentication codes.

Authentication Bypass
NVD GitHub VulDB
CVE-2025-69614
EPSS 0% CVSS 9.4
CRITICAL Act Now

A product has an access control flaw allowing activation token reuse on the password-reset endpoint for unauthorized account takeover.

Authentication Bypass
NVD GitHub VulDB
CVE-2025-48840
EPSS 0% CVSS 5.3
MEDIUM This Month

An authentication bypass by spoofing vulnerability in Fortinet FortiWeb 7.6.0 through 7.6.3, FortiWeb 7.4.0 through 7.4.8, FortiWeb 7.2 all versions, FortiWeb 7.0 all versions may allow a remote unauthenticated attacker to bypass hostname restrictions via a specially crafted request. [CVSS 5.3 MEDIUM]

Fortinet Authentication Bypass Fortiweb
NVD VulDB
CVE-2025-41710
EPSS 0% CVSS 6.5
MEDIUM This Month

An unauthenticated remote attacker may use hardcodes credentials to get access to the previously activated FTP Server with limited read and write privileges. [CVSS 6.5 MEDIUM]

Authentication Bypass
NVD
CVE-2025-27769
EPSS 0% CVSS 2.6
LOW Monitor

A vulnerability has been identified in Heliox Flex 180 kW EV Charging Station (All versions < F4.11.1), Heliox Mobile DC 40 kW EV Charging Station (All versions < L4.10.1). [CVSS 2.6 LOW]

Authentication Bypass
NVD
CVE-2026-30927
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Unauthorized event participation manipulation in Admidio prior to 5.0.6 allows authenticated users to register or cancel participation for other users by manipulating the user_uuid parameter in event functions. Any user with event participation privileges can exploit this to modify another user's event enrollment status without authorization. The vulnerability requires authentication and affects confidentiality through unauthorized modifications.

PHP Authentication Bypass Admidio
NVD GitHub VulDB
Prev Page 15 of 84 Next

Quick Facts

Typical Severity
CRITICAL
Category
auth
Total CVEs
7476

MITRE ATT&CK

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy