Authentication Bypass

auth CRITICAL

Authentication bypass attacks exploit flaws in the verification mechanisms that control access to systems and applications.

How It Works

Authentication bypass attacks exploit flaws in the verification mechanisms that control access to systems and applications. Instead of cracking passwords through brute force, attackers manipulate the authentication process itself to gain unauthorized entry. This typically occurs through one of several pathways: exploiting hardcoded credentials embedded in source code or configuration files, manipulating parameters in authentication requests to skip verification steps, or leveraging broken session management that fails to properly validate user identity.

The attack flow often begins with reconnaissance to identify authentication endpoints and their underlying logic. Attackers may probe for default administrative credentials that were never changed, test whether certain URL paths bypass login requirements entirely, or intercept and modify authentication tokens to escalate privileges. In multi-step authentication processes, flaws in state management can allow attackers to complete only partial verification steps while still gaining full access.

More sophisticated variants exploit single sign-on (SSO) or OAuth implementations where misconfigurations in trust relationships allow attackers to forge authentication assertions. Parameter tampering—such as changing a "role=user" field to "role=admin" in a request—can trick poorly designed systems into granting elevated access without proper verification.

Impact

  • Complete account takeover — attackers gain full control of user accounts, including administrative accounts, without knowing legitimate credentials
  • Unauthorized data access — ability to view, modify, or exfiltrate sensitive information including customer data, financial records, and intellectual property
  • System-wide compromise — admin-level access enables installation of backdoors, modification of security controls, and complete infrastructure takeover
  • Lateral movement — bypassed authentication provides a foothold for moving deeper into networks and accessing additional systems
  • Compliance violations — unauthorized access triggers breach notification requirements and regulatory penalties

Real-World Examples

CrushFTP suffered a critical authentication bypass allowing attackers to access file-sharing functionality without any credentials. The vulnerability enabled direct server-side template injection, leading to remote code execution on affected systems. Attackers actively exploited this in the wild to establish persistent access to enterprise file servers.

Palo Alto's Expedition migration tool contained a flaw permitting attackers to reset administrative credentials without authentication. This allowed complete takeover of the migration environment, potentially exposing network configurations and security policies being transferred between systems.

SolarWinds Web Help Desk (CVE-2024-28987) shipped with hardcoded internal credentials that could not be changed through normal administrative functions. Attackers discovering these credentials gained full administrative access to helpdesk systems containing sensitive organizational information and user data.

Mitigation

  • Implement multi-factor authentication (MFA) — requires attackers to compromise additional verification factors beyond bypassed primary authentication
  • Eliminate hardcoded credentials — use secure credential management systems and rotate all default credentials during deployment
  • Enforce authentication on all endpoints — verify every request requires valid authentication; no "hidden" administrative paths should exist
  • Implement proper session management — use cryptographically secure session tokens, validate on server-side, enforce timeout policies
  • Apply principle of least privilege — limit damage by ensuring even authenticated users only access necessary resources
  • Regular security testing — conduct penetration testing specifically targeting authentication logic and flows

Recent CVEs (7476)

CVE-2026-29077
EPSS 0% CVSS 7.1
HIGH This Week

Frappe versions prior to 15.98.0 and 14.100.0 contain an improper access control vulnerability that allows authenticated users to grant document permissions they do not possess to other users. An attacker with valid credentials could escalate privileges by sharing documents with elevated permissions, potentially exposing sensitive information or enabling unauthorized modifications. No patch is currently available.

Authentication Bypass Frappe
NVD GitHub
CVE-2026-28442
EPSS 0% CVSS 8.5
HIGH POC This Week

ZimaOS 1.5.2-beta3 fails to validate filesystem paths in its API delete endpoint, allowing authenticated users to bypass UI restrictions and remove critical system files and directories. Public exploit code exists for this vulnerability, and the lack of input validation on path parameters enables attackers with API access to potentially render the system unbootable or cause denial of service. No patch is currently available.

Authentication Bypass Zimaos
NVD GitHub
CVE-2026-28410
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Premature token unlock in Graph Protocol Contracts versions before 3.0.0 allows authenticated users to bypass vesting restrictions and access locked tokens before their scheduled release date. An attacker with valid credentials can manipulate the vesting contract logic to drain funds that should remain locked, resulting in unauthorized token theft. A patch is available in version 3.0.0.

Authentication Bypass Graph Protocol Contracts
NVD GitHub
CVE-2025-70614
EPSS 0% CVSS 8.1
HIGH This Week

OpenCode Systems OC Messaging / USSD Gateway OC Release 6.32.2 contains a broken access control vulnerability in the web-based control panel allowing authenticated low-privileged attackers to gain to access to arbitrary SMS messages via a crafted company or tenant identifier parameter. [CVSS 8.1 HIGH]

Authentication Bypass
NVD GitHub
CVE-2026-21621
EPSS 0% CVSS 7.0
HIGH This Week

Hexpm's OAuth implementation fails to enforce read-only API key restrictions during token exchange, allowing an attacker with a victim's read-only API key and valid 2FA code to obtain a full-access API key with unrestricted permissions. This privilege escalation vulnerability affects users of the Hexpm package repository and enables unauthorized modification of packages and account settings. No patch is currently available.

Privilege Escalation Authentication Bypass
NVD GitHub VulDB
CVE-2026-3047
EPSS 0% CVSS 8.8
HIGH This Week

Keycloak's SAML identity provider broker fails to enforce client disabled status during IdP-initiated SSO flows, allowing attackers with valid credentials to establish authenticated sessions and access other enabled clients without re-authentication. An authenticated remote attacker can exploit this authentication bypass to gain unauthorized access to protected resources across the Keycloak ecosystem. No patch is currently available.

Authentication Bypass
NVD VulDB
CVE-2026-3009
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Keycloak's IdentityBrokerService.performLogin endpoint fails to enforce disabled Identity Provider restrictions, allowing attackers with knowledge of an IdP alias to reuse previous login requests and authenticate through administratively disabled external providers. This authentication bypass affects any Keycloak deployment relying on IdP disablement as an access control mechanism. An attacker can exploit this to gain unauthorized access by circumventing intended administrative restrictions on external authentication sources.

Authentication Bypass
NVD
CVE-2026-27723
EPSS 0% CVSS 4.3
MEDIUM This Month

Unauthorized wiki page creation in OpenProject prior to versions 17.0.5 and 17.1.2 allows authenticated attackers to bypass project access controls and create pages in projects they lack permission to access. The vulnerability stems from improper authentication validation on wiki page creation requests, enabling an attacker to modify project documentation without proper authorization. No patch is currently available for affected versions.

Authentication Bypass Openproject
NVD GitHub
CVE-2026-26418
EPSS 0% CVSS 7.5
HIGH This Week

Cognix Platform's web API lacks authentication and authorization controls, enabling unauthenticated remote attackers to access restricted application functionality over the network. This vulnerability affects Tata Consultancy Services Cognix Recon Client v3.0 and poses a high risk due to its ease of exploitation and lack of authentication requirements. No patch is currently available.

Authentication Bypass Cognix Platform
NVD GitHub
CVE-2026-26417
EPSS 0% CVSS 8.1
HIGH This Week

Cognix Platform's password reset function fails to properly validate user permissions, enabling authenticated attackers to reset passwords for any user account through specially crafted requests. This broken access control vulnerability affects Cognix Recon Client v3.0 and carries high severity due to the potential for unauthorized account takeovers. No patch is currently available.

Authentication Bypass Cognix Platform
NVD GitHub
CVE-2026-25921
EPSS 0% CVSS 9.3
CRITICAL POC PATCH Act Now

Supply chain attack via LFS object overwrite across repos in Gogs before 0.14.2. PoC and patch available.

Authentication Bypass Gogs Suse
NVD GitHub
CVE-2026-30793
EPSS 0% CVSS 9.3
CRITICAL Act Now

Security vulnerability in RustDesk remote desktop client/server. One of 6+ critical CVEs affecting the open-source remote access platform.

CSRF Privilege Escalation Authentication Bypass +6
NVD GitHub VulDB
CVE-2026-30789
EPSS 0% CVSS 9.3
CRITICAL Act Now

Security vulnerability in RustDesk remote desktop client/server. One of 6+ critical CVEs affecting the open-source remote access platform.

Authentication Bypass Google Microsoft +4
NVD VulDB
CVE-2026-30784
EPSS 0% CVSS 8.8
HIGH This Week

Unauthenticated attackers can abuse missing authorization controls in RustDesk Server's rendezvous and relay modules (hbbs/hbbr) to gain unauthorized privileges through exposed critical functions like punch hole requests and peer registration. This vulnerability affects RustDesk Server versions through 1.7.5 and 1.1.15, enabling remote privilege escalation over the network with no authentication required. No patch is currently available.

Authentication Bypass
NVD VulDB
CVE-2026-3236
EPSS 0% CVSS 4.3
MEDIUM This Month

Octopus Server allows authenticated attackers to generate new API keys from existing access tokens with extended lifetimes that exceed the original token's validity period. This token lifetime extension vulnerability (CWE-863) could enable attackers with valid credentials to maintain persistent access beyond intended restrictions. The vulnerability affects Octopus Server with no patch currently available.

Authentication Bypass Octopus Server
NVD
CVE-2026-28542
EPSS 0% CVSS 7.3
HIGH This Week

Permission bypass vulnerability in the system service framework. Impact: Successful exploitation of this vulnerability may affect availability. [CVSS 7.3 HIGH]

Authentication Bypass Emui Harmonyos
NVD
CVE-2026-28536
EPSS 0% CVSS 9.6
CRITICAL Act Now

Auth bypass in device authentication module.

Authentication Bypass Harmonyos
NVD
CVE-2026-30777
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

EC-CUBE administrative authentication can be bypassed by attackers possessing valid admin credentials, allowing them to circumvent multi-factor authentication protections and access the admin panel. This vulnerability (CVSS 6.5) affects administrators or high-privileged users whose credentials have been compromised, potentially enabling unauthorized administrative access.

Authentication Bypass Ec Cube
NVD
CVE-2026-28104
EPSS 0% CVSS 6.5
MEDIUM This Month

Site Suggest plugin version 1.3.9 and earlier lacks proper access control checks, enabling unauthenticated remote attackers to access restricted functionality and modify data. The vulnerability affects installations without authentication requirements and could allow attackers to manipulate site suggestions or related content without authorization. No patch is currently available.

Authentication Bypass
NVD
CVE-2026-28076
EPSS 0% CVSS 7.5
HIGH This Week

Frenify Guff versions 1.0.1 and earlier contain an authorization bypass vulnerability that allows unauthenticated remote attackers to access sensitive information through improperly configured access controls. An attacker can exploit this flaw to read confidential data without authentication or user interaction. No patch is currently available for this vulnerability.

Authentication Bypass
NVD
CVE-2026-28071
EPSS 0% CVSS 6.3
MEDIUM This Month

Unauthorized access in PixFort Core through version 3.2.22 allows authenticated attackers to bypass access control restrictions and modify system data due to improper authorization checks. An attacker with valid credentials could exploit this vulnerability to access or modify resources they should not have permission to interact with. No patch is currently available for this vulnerability.

Authentication Bypass
NVD
CVE-2026-28038
EPSS 0% CVSS 6.5
MEDIUM This Month

Brainstorm_Force Ultimate Addons for WPBakery Page Builder ultimate_vc_addons is affected by missing authorization (CVSS 6.5).

Authentication Bypass
NVD VulDB
CVE-2026-27411
EPSS 0% CVSS 5.3
MEDIUM This Month

The SiteGuard WP Plugin for WordPress through version 1.7.9 contains a guessable CAPTCHA implementation that allows attackers to bypass security protections without authentication. This vulnerability enables attackers to circumvent the plugin's functionality controls and potentially gain unauthorized access to protected resources or perform actions that should be restricted.

Authentication Bypass WordPress
NVD
CVE-2026-27396
EPSS 0% CVSS 7.3
HIGH This Week

Improper access control in e-plugins Directory Pro up to version 2.5.6 enables unauthenticated attackers to bypass authorization checks and gain unauthorized access to sensitive directory information. The vulnerability allows attackers to read, modify, or delete data depending on the misconfigured security levels without requiring authentication or user interaction. A patch is not currently available.

Authentication Bypass
NVD
CVE-2026-27390
EPSS 0% CVSS 8.8
HIGH This Week

designthemes WeDesignTech Ultimate Booking Addon wedesigntech-ultimate-booking-addon contains a security vulnerability (CVSS 8.8).

Authentication Bypass
NVD
CVE-2026-27389
EPSS 0% CVSS 9.8
CRITICAL Act Now

Auth bypass in WeDesignTech Ultimate Booking Addon for WordPress.

Authentication Bypass
NVD
CVE-2026-27388
EPSS 0% CVSS 7.5
HIGH This Week

designthemes DesignThemes Booking Manager designthemes-booking-manager is affected by missing authorization (CVSS 7.5).

Authentication Bypass
NVD
CVE-2026-27386
EPSS 0% CVSS 7.5
HIGH This Week

designthemes DesignThemes Directory Addon designthemes-directory-addon is affected by missing authorization (CVSS 7.5).

Authentication Bypass
NVD
CVE-2026-27362
EPSS 0% CVSS 6.5
MEDIUM This Month

kamleshyadav WP Bakery Autoresponder Addon vc-autoresponder-addon is affected by missing authorization (CVSS 6.5).

Authentication Bypass WordPress
NVD
CVE-2026-27361
EPSS 0% CVSS 7.5
HIGH This Week

WebCodingPlace Responsive Posts Carousel Pro responsive-posts-carousel-pro is affected by missing authorization (CVSS 7.5).

Authentication Bypass
NVD
CVE-2026-27344
EPSS 0% CVSS 5.3
MEDIUM This Month

Inseri Core versions up to 1.0.5 contain an authorization bypass vulnerability that allows unauthenticated remote attackers to modify data through improperly configured access controls. The vulnerability has a CVSS score of 5.3 and currently lacks a patch, putting deployments at risk until remediation is available.

Authentication Bypass
NVD
CVE-2026-23799
EPSS 0% CVSS 6.5
MEDIUM This Month

Themeum Tutor LMS through version 3.9.5 contains an authorization bypass that allows authenticated users to modify content they should not have access to due to improper access control validation. An attacker with valid credentials can exploit this vulnerability to alter course materials and settings without proper permission checks. No patch is currently available for this medium-severity issue.

Authentication Bypass
NVD
CVE-2026-23767
EPSS 0% CVSS 9.8
CRITICAL Act Now

ESC/POS printer control language lacks authentication/authorization. Any device on the network can send print commands.

Authentication Bypass Tm M30iii H Firmware Tm T88vi Ihub Firmware +22
NVD
CVE-2026-22479
EPSS 0% CVSS 7.5
HIGH This Week

Improper access control in Ruby's ThemeRuby Easy Post Submission plugin through version 2.2.0 allows unauthenticated remote attackers to bypass authorization checks and gain unauthorized read access to sensitive data. The vulnerability stems from misconfigured security levels that fail to properly enforce access restrictions on protected functionality. No patch is currently available for affected installations.

Authentication Bypass
NVD
CVE-2026-22459
EPSS 0% CVSS 6.5
MEDIUM This Month

Improper access control in the Blend Media WordPress CTA easy-sticky-sidebar plugin through version 1.7.4 allows unauthenticated attackers to exploit misconfigured security levels and gain unauthorized access to sensitive functionality. The vulnerability affects WordPress installations running the vulnerable plugin versions and could enable attackers to read restricted information or disrupt service availability. No security patch is currently available.

WordPress Authentication Bypass
NVD
CVE-2025-69340
EPSS 0% CVSS 7.5
HIGH This Week

BuddhaThemes WeDesignTech Ultimate Booking Addon wedesigntech-ultimate-booking-addon is affected by missing authorization (CVSS 7.5).

Authentication Bypass
NVD
CVE-2026-2836
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Pingora's default HTTP cache key implementation excludes the host header when generating cache keys, allowing attackers to poison the cache and serve cross-origin responses to victims. This affects deployments using the default CacheKey implementation in multi-tenant environments, where an attacker could cause users from one tenant to receive cached responses belonging to another tenant. No patch is currently available for this high-severity vulnerability.

Authentication Bypass Pingora
NVD GitHub
CVE-2026-29045
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Hono versions prior to 4.12.4 suffer from an authentication bypass in serveStatic when combined with route-based middleware protections due to inconsistent URL decoding between the router and file serving components. An unauthenticated remote attacker can exploit this mismatch by encoding slashes (%2F) in request paths to access protected static resources that should be restricted by middleware rules. A patch is available in version 4.12.4 and later.

Authentication Bypass Hono
NVD GitHub
CVE-2026-29000
EPSS 0% CVSS 9.1
CRITICAL POC PATCH Act Now

JWT authentication bypass in pac4j-jwt before 4.5.9/5.7.9/6.3.3 when processing encrypted JWTs. PoC available.

Authentication Bypass
NVD VulDB
CVE-2026-27898
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Vaultwarden versions up to 1.35.4 is affected by authorization bypass through user-controlled key (CVSS 5.4).

Authentication Bypass Vaultwarden Redhat
NVD GitHub
CVE-2026-27801
EPSS 0% CVSS 5.9
MEDIUM POC PATCH This Month

Two-factor authentication bypass in Vaultwarden 1.34.3 and earlier allows authenticated attackers to circumvent 2FA protections on sensitive operations, enabling unauthorized access to API keys and destructive actions against vaults and organizations. Public exploit code exists for this vulnerability, which affects the unofficial Bitwarden-compatible server and currently lacks an available patch. Attackers with legitimate account credentials can escalate privileges to perform administrative actions typically restricted by 2FA controls.

Authentication Bypass Vaultwarden Redhat
NVD GitHub
CVE-2026-25750
EPSS 0% CVSS 8.1
HIGH This Week

LangSmith Studio contains a URL parameter injection vulnerability that allows attackers to steal authentication tokens, user IDs, and workspace credentials from users who click malicious links, enabling account takeover and unauthorized access to workspace resources. Both LangSmith Cloud and self-hosted Kubernetes deployments are affected, with exploitation requiring social engineering to trick authenticated users into clicking attacker-controlled URLs. No patch is currently available for this high-severity vulnerability (CVSS 8.1).

Kubernetes Authentication Bypass Langsmith +2
NVD GitHub VulDB
CVE-2026-26949
EPSS 0% CVSS 5.5
MEDIUM This Month

Dell Device Management Agent versions before 26.02 suffer from an authorization bypass that allows local attackers with low privileges to escalate their access on affected systems. The vulnerability stems from improper privilege validation and requires only local access with no user interaction to exploit. No patch is currently available for this issue.

Authentication Bypass Dell Device Management Agent
NVD
CVE-2026-20079
EPSS 0% 4.2 CVSS 10.0
CRITICAL POC Emergency

Unauthenticated auth bypass in Cisco FMC web interface. CVSS 10.0.

Cisco Authentication Bypass
NVD GitHub
CVE-2019-25506
EPSS 0% CVSS 8.2
HIGH POC This Week

FreeSMS 2.1.2 contains a boolean-based blind SQL injection vulnerability in the password parameter that allows unauthenticated attackers to bypass authentication by injecting SQL code through the login endpoint. [CVSS 8.2 HIGH]

PHP SQLi Authentication Bypass +1
NVD Exploit-DB
CVE-2019-25501
EPSS 0% CVSS 8.2
HIGH POC This Week

Simple Job Script contains an SQL injection vulnerability that allows attackers to manipulate database queries by injecting malicious SQL code through the app_id parameter. [CVSS 8.2 HIGH]

PHP SQLi Authentication Bypass +1
NVD Exploit-DB
CVE-2019-25499
EPSS 0% CVSS 8.2
HIGH POC This Week

Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the job_id parameter. [CVSS 8.2 HIGH]

PHP SQLi Authentication Bypass +1
NVD Exploit-DB
CVE-2019-25498
EPSS 0% CVSS 8.2
HIGH POC This Week

Simple Job Script contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the landing_location parameter. [CVSS 8.2 HIGH]

SQLi Authentication Bypass Simplejobscript
NVD Exploit-DB
CVE-2026-29069
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Unauthenticated attackers can trigger activation emails for pending user accounts in Craft CMS versions prior to 5.9.0-beta.2 and 4.17.0-beta.2 by exploiting an unprotected endpoint that lacks permission checks. If an attacker controls the target user's email address, they can complete account activation and gain unauthorized system access. A patch is available in the latest beta versions.

Authentication Bypass Craft Cms
NVD GitHub
CVE-2026-28782
EPSS 0% CVSS 4.3
MEDIUM POC PATCH This Month

Craft CMS prior to versions 5.9.0-beta.1 and 4.17.0-beta.1 fails to properly authorize the "Duplicate" entry action, allowing authenticated users to bypass UI restrictions and duplicate entries via direct requests. An attacker with minimal "View Entries" permissions can exploit predictable, incremental Entry IDs to brute-force and duplicate other users' restricted content, gaining unauthorized access to sensitive data. Public exploit code exists for this vulnerability.

Authentication Bypass Craft Cms
NVD GitHub
CVE-2026-28781
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Craft CMS prior to versions 4.17.0-beta.1 and 5.9.0-beta.1 allows users with entry creation permissions to arbitrarily assign authorship of new entries to any user, including administrators, through mass assignment of the authorId parameter. Public exploit code exists for this vulnerability, enabling attackers to spoof entry authorship and manipulate content attribution. The vulnerability is fixed in the specified beta releases.

Authentication Bypass Craft Cms
NVD GitHub
CVE-2026-28696
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Craft is a content management system (CMS). [CVSS 7.5 HIGH]

Authentication Bypass Craft Cms
NVD GitHub
CVE-2026-23811
EPSS 0% CVSS 4.3
MEDIUM This Month

Arubaos contains a vulnerability that allows attackers to bypass Layer 2 (L2) communication restrictions between clients and redirect traf (CVSS 4.3).

Authentication Bypass Arubaos
NVD
CVE-2026-23601
EPSS 0% CVSS 5.4
MEDIUM This Month

Improper cryptographic validation in ArubaOS Wi-Fi encryption allows adjacent network attackers to forge authenticated frames by spoofing the primary BSSID and inject tampered data to targeted clients without authentication. This medium-severity flaw (CVSS 5.4) bypasses standard encryption separation between wireless endpoints, enabling data manipulation on affected networks. No patch is currently available.

Authentication Bypass Arubaos
NVD
CVE-2026-22285
EPSS 0% CVSS 4.4
MEDIUM This Month

Dell Device Management Agent versions before 26.02 store passwords in plaintext, allowing high-privileged local attackers to gain unauthorized access to sensitive systems. The vulnerability requires administrative-level access and local presence but poses a confidentiality risk to affected deployments. No patch is currently available.

Authentication Bypass Dell Device Management Agent
NVD
CVE-2025-59785
EPSS 0% CVSS 7.2
HIGH This Week

Access Commander contains a vulnerability that allows attackers to bypass password policy for backup file encryption (CVSS 7.2).

Authentication Bypass Access Commander
NVD
CVE-2026-3103
EPSS 0% CVSS 5.4
MEDIUM This Month

Data loss in Checkmk versions before 2.4.0p23, 2.3.0p43, and 2.2.0 results from a logic error in the remove_password() function that allows low-privileged users to delete sensitive information. An authenticated attacker can exploit this vulnerability to cause unintended data loss without requiring user interaction. No patch is currently available for affected deployments.

Authentication Bypass Checkmk
NVD
CVE-2025-40896
EPSS 0% CVSS 6.5
MEDIUM This Month

The server certificate was not verified when an Arc agent connected to a Guardian or CMC. A malicious actor could perform a man-in-the-middle attack and intercept the communication between the Arc agent and the Guardian or CMC. [CVSS 6.5 MEDIUM]

Authentication Bypass Arc
NVD
CVE-2026-21422
EPSS 0% CVSS 3.4
LOW Monitor

Dell PowerScale OneFS, versions 9.10.0.0 through 9.10.1.5 and versions 9.11.0.0 through 9.12.0.1, contains an external control of system or configuration setting vulnerability. [CVSS 3.4 LOW]

Authentication Bypass Dell
NVD
CVE-2026-2748
EPSS 0% CVSS 5.3
MEDIUM This Month

SEPPmail Secure Email Gateway versions before 15.0.1 fail to properly validate S/MIME certificates with whitespace characters in email addresses, enabling attackers to forge digital signatures and impersonate legitimate senders. This integrity bypass affects organizations relying on SEPPmail for secure email validation and could undermine trust in digitally signed communications. No patch is currently available for affected installations.

Authentication Bypass Seppmail
NVD
CVE-2026-27446
EPSS 0% CVSS 9.8
CRITICAL PATCH Act Now

Missing authentication in Apache ActiveMQ Artemis. Unauthenticated remote attacker can access message broker. EPSS 0.20%.

Apache Authentication Bypass Activemq Artemis +2
NVD VulDB
CVE-2026-29120
EPSS 0% CVSS 7.8
HIGH This Week

Local privilege escalation in IDC SFX2100 Satellite Receiver firmware stems from a hardcoded root password hash stored in the installation configuration file that is vulnerable to offline dictionary attacks. An attacker with low-privileged local access can exploit this weak credential to escalate to root, though no patch is currently available. The vulnerability requires prior system compromise but provides a reliable path to full administrative control on affected devices.

Authentication Bypass Sfx2100 Firmware
NVD VulDB
CVE-2026-29119
EPSS 0% CVSS 9.8
CRITICAL Act Now

Hardcoded/insecure credentials in IDC SFX Series SuperFlex Satellite Receiver. Multiple accounts with known credentials enable complete device takeover.

Authentication Bypass Sfx2100 Firmware
NVD VulDB
CVE-2026-28778
EPSS 0% CVSS 9.8
CRITICAL Act Now

Hardcoded/insecure credentials in IDC SFX Series SuperFlex Satellite Receiver. Multiple accounts with known credentials enable complete device takeover.

Authentication Bypass RCE Sfx2100 Firmware
NVD VulDB
CVE-2026-28777
EPSS 0% CVSS 9.8
CRITICAL Act Now

Hardcoded/insecure credentials in IDC SFX Series SuperFlex Satellite Receiver. Multiple accounts with known credentials enable complete device takeover.

Authentication Bypass Sfx2100 Firmware
NVD VulDB
CVE-2026-28776
EPSS 0% CVSS 9.8
CRITICAL Act Now

Hardcoded/insecure credentials in IDC SFX Series SuperFlex Satellite Receiver. Multiple accounts with known credentials enable complete device takeover.

Authentication Bypass Sfx2100 Firmware
NVD VulDB
CVE-2026-3266
EPSS 0% CVSS 9.8
CRITICAL Act Now

Missing authorization in OpenText Filr allows auth bypass via XSRF tokens.

Authentication Bypass Filr
NVD
CVE-2026-27981
EPSS 0% CVSS 7.4
HIGH This Week

Homebox prior to version 0.24.0 fails to validate the TrustProxy configuration setting, allowing attackers to bypass authentication rate limiting by forging the X-Real-IP header on direct connections. This enables an attacker to attempt unlimited authentication attempts by spoofing a different IP address for each request, compromising both confidentiality and integrity of the system. The vulnerability affects all Homebox installations where the TrustProxy option is disabled or misconfigured.

Authentication Bypass Homebox
NVD GitHub
CVE-2026-3224
EPSS 0% CVSS 9.8
CRITICAL Act Now

Azure AD auth bypass in Devolutions Server 2025.3.15.0 and earlier.

Azure Authentication Bypass Devolutions Server
NVD
CVE-2026-27012
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

Privilege escalation and auth bypass in OpenSTAManager 2.9.8. PoC available.

PHP Privilege Escalation Authentication Bypass +1
NVD GitHub
CVE-2026-24898
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

Unauthenticated token disclosure in OpenEMR before 8.0.0. CVSS 10.0. PoC and patch available.

Authentication Bypass Information Disclosure PHP +1
NVD GitHub
CVE-2026-1775
EPSS 0%
This Week

The Labkotec LID-3300IP has an existing vulnerability in the ice detector software that enables an unauthenticated attacker to alter device parameters and run operational commands when specially crafted packets are sent to the device.

Authentication Bypass
NVD
CVE-2026-0869
EPSS 0% CVSS 8.8
HIGH This Week

Brocade Active Support Connectivity Gateway versions up to 3.4.0 contains a vulnerability that allows attackers to an unauthorized user to perform ASCG operations related to Brocade Support Link( (CVSS 8.8).

Authentication Bypass Brocade Active Support Connectivity Gateway
NVD
CVE-2024-55025
EPSS 0% CVSS 6.5
MEDIUM This Month

Incorrect access control in the VNC component of Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 allows unauthorized attackers to access the HMI system. [CVSS 6.5 MEDIUM]

Authentication Bypass Easyweb Cmt 3072xh2 Firmware
NVD GitHub
CVE-2024-55024
EPSS 0% CVSS 9.8
CRITICAL Act Now

Auth bypass in Weintek cMT-3072XH2 authorization mechanism.

Authentication Bypass Easyweb Cmt 3072xh2 Firmware
NVD GitHub
CVE-2024-55023
EPSS 0% CVSS 5.3
MEDIUM This Month

Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain a hardcoded encryption key which could allow attackers to access sensitive information. [CVSS 5.3 MEDIUM]

Authentication Bypass Cmt 3072xh2 Firmware Easyweb
NVD GitHub
CVE-2024-55021
EPSS 0% CVSS 7.5
HIGH This Week

Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain a hardcoded password in the FTP protocol. [CVSS 7.5 HIGH]

Authentication Bypass Cmt 3072xh2 Firmware Easyweb
NVD GitHub
CVE-2024-55019
EPSS 0% CVSS 7.5
HIGH This Week

Incorrect access control in the component download_wb.cgi of Weintek cMT-3072XH2 easyweb Web Version v2.1.53, OS v20231011 allows unauthenticated attack to download arbitrary files. [CVSS 7.5 HIGH]

Authentication Bypass Easyweb Cmt 3072xh2 Firmware
NVD GitHub
CVE-2025-63910
EPSS 0% CVSS 7.2
HIGH POC This Week

Tranzman versions up to 4.0 is affected by insufficient verification of data authenticity (CVSS 7.2).

File Upload Authentication Bypass RCE +1
NVD GitHub
CVE-2025-63909
EPSS 0% CVSS 7.2
HIGH POC This Week

Incorrect access control in the component /opt/SRLtzm/bin/TapeDumper of Cohesity TranZman Migration Appliance Release 4.0 Build 14614 allows attackers to escalate privileges to root and read and write arbitrary files. [CVSS 7.2 HIGH]

Privilege Escalation Authentication Bypass Tranzman
NVD GitHub
CVE-2026-3344
EPSS 0% CVSS 4.9
MEDIUM This Month

WatchGuard Fireware OS contains a filesystem integrity bypass vulnerability in versions 12.0-12.11.7, 12.5.9-12.5.16, and 2025.1-2026.1.1 that allows authenticated attackers with high privileges to deploy malicious firmware updates and establish limited persistence on affected appliances. An attacker could circumvent security checks designed to validate firmware authenticity, though currently no patch is available.

Authentication Bypass Fireware
NVD
CVE-2025-15598
EPSS 0% CVSS 3.7
LOW POC Monitor

A vulnerability was found in Dataease SQLBot up to 1.5.1. This impacts the function validateEmbedded of the file backend/apps/system/middleware/auth.py of the component JWT Token Handler. Performing a manipulation results in improper verification of cryptographic signature. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is said to be difficult. The exploit has been made public and could be used. A comment in the source code warns use...

Authentication Bypass
NVD GitHub VulDB
CVE-2026-2628
EPSS 0% CVSS 9.8
CRITICAL Act Now

Auth bypass in All-in-One Microsoft 365 SSO WordPress plugin.

WordPress Azure Authentication Bypass
NVD
CVE-2026-28361
EPSS 0% CVSS 6.3
MEDIUM PATCH This Month

Nocodb versions up to 0.301.3 is affected by authorization bypass through user-controlled key (CVSS 6.3).

Authentication Bypass Nocodb
NVD GitHub
CVE-2026-0689
EPSS 0%
Monitor

In ExtremeCloud IQ - Site Engine (XIQ‑SE) before 26.2.10, a vulnerability in the NAC administration interface allows an authenticated NAC administrator to retrieve masked sensitive parameters from HTTP responses.

Authentication Bypass
NVD
CVE-2025-52469
EPSS 0% CVSS 7.1
HIGH POC PATCH This Week

Chamilo is a learning management system. Prior to version 1.11.30, a logic vulnerability in the friend request workflow of Chamilo’s social network module allows an authenticated user to forcibly add any user as a friend by directly calling the AJAX endpoint. [CVSS 7.1 HIGH]

Authentication Bypass Chamilo Lms
NVD GitHub
CVE-2026-23600
EPSS 0%
This Week

A remote authentication bypass vulnerability  exists in HPE AutoPass License Server (APLS).

Authentication Bypass
NVD
CVE-2026-3432
EPSS 0% CVSS 9.1
CRITICAL Act Now

SimStudio has a second authorization flaw in the OAuth token endpoint that allows privilege escalation through crafted token requests.

Authentication Bypass Sim
NVD
CVE-2025-58402
EPSS 0% CVSS 7.5
HIGH This Week

The CGM CLININET application uses direct, sequential object identifiers "MessageID" without proper authorization checks. By modifying the parameter in the GET request, an attacker can access messages and attachments belonging to other users. [CVSS 7.5 HIGH]

Authentication Bypass Clininet
NVD
CVE-2025-30035
EPSS 0%
This Week

The vulnerability enables an attacker to fully bypass authentication in CGM CLININET and gain access to any active user account by supplying only the username, without requiring a password or any other credentials.

Authentication Bypass
NVD
Prev Page 17 of 84 Next

Quick Facts

Typical Severity
CRITICAL
Category
auth
Total CVEs
7476

MITRE ATT&CK

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy