Authentication Bypass

auth CRITICAL

Authentication bypass attacks exploit flaws in the verification mechanisms that control access to systems and applications.

How It Works

Authentication bypass attacks exploit flaws in the verification mechanisms that control access to systems and applications. Instead of cracking passwords through brute force, attackers manipulate the authentication process itself to gain unauthorized entry. This typically occurs through one of several pathways: exploiting hardcoded credentials embedded in source code or configuration files, manipulating parameters in authentication requests to skip verification steps, or leveraging broken session management that fails to properly validate user identity.

The attack flow often begins with reconnaissance to identify authentication endpoints and their underlying logic. Attackers may probe for default administrative credentials that were never changed, test whether certain URL paths bypass login requirements entirely, or intercept and modify authentication tokens to escalate privileges. In multi-step authentication processes, flaws in state management can allow attackers to complete only partial verification steps while still gaining full access.

More sophisticated variants exploit single sign-on (SSO) or OAuth implementations where misconfigurations in trust relationships allow attackers to forge authentication assertions. Parameter tampering—such as changing a "role=user" field to "role=admin" in a request—can trick poorly designed systems into granting elevated access without proper verification.

Impact

  • Complete account takeover — attackers gain full control of user accounts, including administrative accounts, without knowing legitimate credentials
  • Unauthorized data access — ability to view, modify, or exfiltrate sensitive information including customer data, financial records, and intellectual property
  • System-wide compromise — admin-level access enables installation of backdoors, modification of security controls, and complete infrastructure takeover
  • Lateral movement — bypassed authentication provides a foothold for moving deeper into networks and accessing additional systems
  • Compliance violations — unauthorized access triggers breach notification requirements and regulatory penalties

Real-World Examples

CrushFTP suffered a critical authentication bypass allowing attackers to access file-sharing functionality without any credentials. The vulnerability enabled direct server-side template injection, leading to remote code execution on affected systems. Attackers actively exploited this in the wild to establish persistent access to enterprise file servers.

Palo Alto's Expedition migration tool contained a flaw permitting attackers to reset administrative credentials without authentication. This allowed complete takeover of the migration environment, potentially exposing network configurations and security policies being transferred between systems.

SolarWinds Web Help Desk (CVE-2024-28987) shipped with hardcoded internal credentials that could not be changed through normal administrative functions. Attackers discovering these credentials gained full administrative access to helpdesk systems containing sensitive organizational information and user data.

Mitigation

  • Implement multi-factor authentication (MFA) — requires attackers to compromise additional verification factors beyond bypassed primary authentication
  • Eliminate hardcoded credentials — use secure credential management systems and rotate all default credentials during deployment
  • Enforce authentication on all endpoints — verify every request requires valid authentication; no "hidden" administrative paths should exist
  • Implement proper session management — use cryptographically secure session tokens, validate on server-side, enforce timeout policies
  • Apply principle of least privilege — limit damage by ensuring even authenticated users only access necessary resources
  • Regular security testing — conduct penetration testing specifically targeting authentication logic and flows

Recent CVEs (7654)

EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Unauthenticated message injection in PolarLearn 0-PRERELEASE-16 and earlier allows remote attackers to send persistent messages to arbitrary group chats via the WebSocket API without credentials. Public exploit code exists for this vulnerability, which affects all users of vulnerable versions by enabling spam and potential information manipulation within group communications.

Authentication Bypass Polarlearn
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL Act Now

PlaciPy has an incorrect authorization allowing privilege escalation — seventh and final critical vulnerability.

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 9.1
CRITICAL Act Now

PlaciPy has an incorrect authorization vulnerability — fifth of seven critical flaws.

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 7.5
HIGH POC PATCH This Week

Hollo versions prior to 0.6.20 and 0.7.2 improperly expose direct messages and followers-only posts through the ActivityPub outbox endpoint, allowing unauthenticated remote attackers to access sensitive user communications. Public exploit code exists for this authorization bypass vulnerability, enabling attackers to enumerate and retrieve private content intended for restricted audiences. Patched versions 0.6.20 and 0.7.2 are available to remediate the exposure.

Authentication Bypass Hollo
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Froshadminer versions up to 2.2.1 is affected by missing authentication for critical function (CVSS 5.3).

Authentication Bypass Froshadminer
NVD GitHub
EPSS 0% CVSS 9.1
CRITICAL Act Now

PlaciPy has another missing authorization vulnerability — fourth of seven critical security flaws.

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 9.1
CRITICAL Act Now

PlaciPy has a missing authorization vulnerability — third of seven critical security flaws.

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 9.8
CRITICAL Act Now

PlaciPy placement system 1.0.0 has an improper authorization vulnerability enabling unauthenticated admin access — second of seven critical PlaciPy vulnerabilities.

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM This Month

PlaciPy is a placement management system designed for educational institutions. [CVSS 6.5 MEDIUM]

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM POC PATCH This Month

Litestar versions before 2.20.0 improperly escape regex metacharacters in the allowed_hosts middleware, allowing attackers to bypass hostname validation by supplying hosts that match the compiled regex pattern but differ from intended literal hostnames. Public exploit code exists for this vulnerability. The flaw affects the ASGI framework's ability to properly restrict incoming requests to authorized hosts.

Authentication Bypass Litestar
NVD GitHub
EPSS 0% CVSS 7.5
HIGH POC This Week

Unauthenticated directory traversal in FileRise prior to version 3.3.0 allows remote attackers to read arbitrary files from the /uploads directory without authentication by directly accessing guessable file paths. Public exploit code exists for this vulnerability, enabling attackers to expose sensitive data and breach user privacy. No patch is currently available.

Authentication Bypass Information Disclosure Filerise
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Markus versions up to 2.9.1 is affected by authorization bypass through user-controlled key (CVSS 6.5).

Authentication Bypass Markus
NVD GitHub
EPSS 0% CVSS 8.1
HIGH PATCH This Week

Keycloak's invitation token validation fails to cryptographically verify JWT payload modifications, allowing authenticated attackers to alter organization IDs and email addresses to register into unauthorized organizations. This enables unauthorized access to organizations without proper authentication, affecting any Keycloak deployment using the invitation feature. No patch is currently available.

Authentication Bypass Redhat
NVD
EPSS 0% CVSS 6.7
MEDIUM This Month

Insufficient permission validation in OpenProject prior to 17.0.2 allows users with the Manage Users permission to lock and unlock application administrators, a capability that should be restricted to administrators only. An authenticated attacker with user management privileges can exploit this to lock out admin accounts and potentially disrupt system administration capabilities. No patch is currently available for affected versions.

Authentication Bypass Openproject
NVD GitHub
EPSS 0%
This Week

Improper permission enforcement in Checkmk versions 2.4.0 versions up to 2.4.0 is affected by missing authorization.

Authentication Bypass
NVD
EPSS 0% CVSS 7.3
HIGH This Week

Birtech Information Technologies Industry and Trade Ltd. Co. Senseway is affected by improper authentication (CVSS 7.3).

Authentication Bypass
NVD
EPSS 0% CVSS 9.1
CRITICAL Act Now

JetBrains Hub before 2025.3.119807 has an authentication bypass allowing administrative actions without proper credentials.

Authentication Bypass Hub
NVD
EPSS 0% CVSS 5.3
MEDIUM PATCH This Month

Authentication Bypass by Alternate Name vulnerability in Apache Shiro. This issue affects Apache Shiro: before 2.0.7. [CVSS 5.3 MEDIUM]

macOS Apache Authentication Bypass +2
NVD
EPSS 0% CVSS 9.1
CRITICAL Act Now

HGiga C&Cm@il email system has a missing authentication vulnerability allowing unauthenticated remote access to email server functions.

Authentication Bypass
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

A device stores user credentials using AES-ECB encryption with a hard-coded key, allowing any attacker to decrypt all stored passwords.

Authentication Bypass
NVD
EPSS 0% CVSS 7.5
HIGH This Week

Insufficient URI validation in CGI endpoints permits unauthenticated attackers to bypass authentication controls through path traversal techniques, enabling direct access to protected administrative functions and configuration files. An attacker can exploit this remotely without credentials to retrieve sensitive data and potentially modify system settings. No patch is currently available for this vulnerability.

Authentication Bypass Path Traversal
NVD
EPSS 0% CVSS 5.7
MEDIUM This Month

Improper server identity validation in Eaton Network M3 firmware upgrade functionality enables man-in-the-middle attacks by network-adjacent threat actors with high privileges. An attacker can intercept and manipulate firmware updates to inject malicious code, compromise system integrity, or disrupt availability. No patch is currently available for this medium-severity issue.

Authentication Bypass
NVD
EPSS 0% CVSS 7.3
HIGH This Week

Improper authentication in the CRUD endpoint of code-projects Contact Management System 1.0 allows unauthenticated remote attackers to manipulate ID parameters and bypass access controls. This vulnerability enables unauthorized users to read, modify, or delete sensitive contact data without valid credentials. No patch is currently available.

Authentication Bypass Contact Management System
NVD VulDB
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Unrestricted file upload in Yshopmall up to version 1.9.1 allows authenticated attackers to upload arbitrary files via manipulation of the updateAvatar function in the FileUtil component. Public exploit code exists for this vulnerability, increasing the risk of active exploitation. The vendor has not yet released a patch despite early notification.

File Upload Authentication Bypass Yshopmall
NVD GitHub VulDB
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Wekan versions up to 8.20 contain an authorization bypass in the Rules Handler component that allows authenticated remote attackers to access unauthorized information through the rules.js file. The vulnerability requires valid credentials but no user interaction, enabling low-impact confidentiality breaches. Upgrading to version 8.21 resolves this issue.

Authentication Bypass Wekan
NVD GitHub VulDB
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Wekan before version 8.20 fails to properly validate user permissions on migration functions, allowing authenticated non-admin users to execute unauthorized migration operations. This vulnerability affects any Wekan deployment and could be exploited by low-privileged users to compromise data integrity or availability. A patch is available.

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Wekan versions before 8.19 fail to properly enforce the allowPrivateOnly configuration setting during board creation, allowing authenticated users to create public boards when only private boards should be permitted. This authorization bypass enables users to circumvent intended access control policies and expose board data beyond the intended scope. A patch is available for affected installations.

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

Wekan versions up to 8.19 is affected by authorization bypass through user-controlled key (CVSS 4.3).

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

WeKan versions prior to 8.19 contain an authorization vulnerability in card move logic. [CVSS 5.4 MEDIUM]

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Wekan prior to version 8.19 improperly validates permissions on card update API endpoints, checking only read access instead of requiring write permissions. This allows read-only users to modify cards they should not be able to edit. A patch is available to address this authorization bypass.

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Wekan versions up to 8.19 is affected by authorization bypass through user-controlled key (CVSS 7.5).

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 7.5
HIGH PATCH This Week

Wekan versions up to 8.19 is affected by authorization bypass through user-controlled key (CVSS 7.5).

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 7.5
HIGH PATCH This Week

WeKan versions prior to 8.19 contain an authorization weakness in the attachment upload API. [CVSS 7.5 HIGH]

Authentication Bypass Wekan
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM This Month

Advanced Country Blocker (WordPress plugin) versions up to 2.3.1 contains a security vulnerability (CVSS 5.3).

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 7.5
HIGH POC This Week

DBPower C300 HD Camera contains a configuration disclosure vulnerability that allows unauthenticated attackers to retrieve sensitive credentials through an unprotected configuration backup endpoint. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
EPSS 0% CVSS 7.5
HIGH POC This Week

ACE Security WiP-90113 HD Camera contains a configuration disclosure vulnerability that allows unauthenticated attackers to retrieve sensitive configuration files. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
EPSS 0% CVSS 7.5
HIGH POC This Week

AMSS++ 4.7 contains an authentication bypass vulnerability that allows attackers to access administrative accounts using hardcoded credentials. Attackers can log in with the default admin username and password '1234' to gain unauthorized administrative access to the system. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
EPSS 0% CVSS 9.8
CRITICAL Act Now

3DP-MANAGER for 3x-ui has hard-coded credentials (CVSS 9.8) in version 2.0.1 that provide automatic access to the management interface.

Authentication Bypass 3dp Manager
NVD GitHub VulDB
EPSS 0% CVSS 7.4
HIGH POC PATCH This Week

Trilium Notes is an open-source, cross-platform hierarchical note taking application with focus on building large personal knowledge bases. [CVSS 7.4 HIGH]

Authentication Bypass Trilium
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

DeepAudit is a multi-agent system for code vulnerability discovery. [CVSS 6.5 MEDIUM]

Authentication Bypass AI / ML Deepaudit
NVD GitHub
EPSS 0% CVSS 6.3
MEDIUM POC This Month

Smart Pixelator 2.0's Bluetooth Low Energy interface lacks proper authentication controls, allowing unauthenticated attackers on the local network to manipulate device functionality and potentially compromise confidentiality and integrity. Public exploit code exists for this vulnerability, and the vendor has not provided a patch despite early notification.

Authentication Bypass Smart Pixelator Firmware
NVD GitHub VulDB
EPSS 0% CVSS 9.4
CRITICAL PATCH Act Now

Keylime attestation framework since version 7.12.0 has a TLS authentication flaw where the registrar doesn't enforce client-side certificate validation.

Authentication Bypass Enterprise Linux For Ibm Z Systems Enterprise Linux For Arm 64 Eus +9
NVD
EPSS 0% CVSS 9.8
CRITICAL Act Now

PlaciPy placement management system 1.0.0 uses a hard-coded password, allowing any attacker who discovers it to gain full system access.

Authentication Bypass Placipy
NVD GitHub
EPSS 0% CVSS 8.2
HIGH PATCH This Week

Unauthenticated attackers can bypass public link scope verification in OpenCloud Reva versions prior to 2.42.3 and 2.40.3 through a flaw in GRPC authorization middleware. By exploiting the archiver service, an attacker can create archives containing all resources accessible to the public link creator, resulting in unauthorized information disclosure. A patch is available in versions 2.42.3 and 2.40.3.

Authentication Bypass Opencloud Reva Suse
NVD GitHub
EPSS 0% CVSS 4.3
MEDIUM This Month

OpenProject versions prior to 17.0.2 fail to validate meeting section ownership during drag-and-drop operations, allowing authenticated users to inject agenda items into unrelated meetings. While attackers cannot access unauthorized meeting content, they can add arbitrary agenda items to other meetings to cause confusion or disrupt meeting organization. A patch is available in version 17.0.2.

Authentication Bypass Openproject
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

Gogs versions 0.13.3 and earlier fail to enforce write permissions on the repository contents endpoint, allowing attackers with read-only access to modify files, create commits, and execute git push operations. An authenticated user possessing only read permissions can bypass authorization checks and gain unauthorized write access to repository contents. This affects self-hosted Gogs instances and has no patch currently available for affected versions.

Authentication Bypass Gogs Suse
NVD GitHub
EPSS 0% CVSS 7.6
HIGH POC PATCH This Week

Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The administrative dashboard exposes each user’s long-lived API key directly inside the rendered HTML/JavaScript of the page on every login. [CVSS 7.6 HIGH]

Authentication Bypass Information Disclosure Gophish +1
NVD GitHub
EPSS 0% CVSS 8.8
HIGH PATCH This Week

Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, Gogs’ 2FA recovery code validation does not scope codes by user, enabling cross-account bypass. [CVSS 8.8 HIGH]

Authentication Bypass Gogs Suse
NVD GitHub
EPSS 0% CVSS 5.9
MEDIUM This Month

Identity authentication bypass vulnerability in the window module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. [CVSS 5.9 MEDIUM]

Authentication Bypass Harmonyos
NVD
EPSS 1% CVSS 8.8
HIGH This Week

WP Duplicate WordPress plugin has a missing authorization vulnerability leading to arbitrary file deletion that can destroy the WordPress installation.

WordPress RCE Authentication Bypass +2
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

Collabora Online is a collaborative online office suite based on LibreOffice technology. [CVSS 5.3 MEDIUM]

Authentication Bypass
NVD GitHub
EPSS 0% CVSS 8.6
HIGH This Week

Azure Arc Elevation of Privilege Vulnerability [CVSS 8.6 HIGH]

Microsoft Authentication Bypass
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

Tanium addressed an improper access controls vulnerability in Reputation. [CVSS 4.3 MEDIUM]

Authentication Bypass Reputation
NVD
EPSS 0% CVSS 8.8
HIGH This Week

Tanium addressed an improper input validation vulnerability in Deploy. [CVSS 8.8 HIGH]

Authentication Bypass Deploy
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

Tanium addressed an improper access controls vulnerability in Deploy. [CVSS 4.3 MEDIUM]

Authentication Bypass Deploy
NVD
EPSS 0% CVSS 4.3
MEDIUM This Month

Tanium addressed an improper access controls vulnerability in Patch. [CVSS 4.3 MEDIUM]

Authentication Bypass Patch
NVD
EPSS 0% CVSS 3.7
LOW Monitor

Tanium addressed an improper certificate validation vulnerability in Tanium Appliance. [CVSS 3.7 LOW]

Authentication Bypass
NVD
EPSS 0% CVSS 3.1
LOW Monitor

Tanium addressed an improper access controls vulnerability in Interact. [CVSS 3.1 LOW]

Authentication Bypass
NVD
EPSS 0% CVSS 7.4
HIGH PATCH This Week

Command execution in pgAdmin 4 server mode allows authenticated attackers to bypass restore operation restrictions by extracting the restrict key during PLAIN-format dump file operations and injecting malicious payloads to re-enable meta-commands. An attacker with web interface access can race the restore process in real time to achieve reliable code execution on the pgAdmin host. No patch is currently available for this vulnerability.

Authentication Bypass Pgadmin 4 Suse
NVD GitHub
EPSS 0% CVSS 10.0
CRITICAL POC PATCH Act Now

Critical certificate validation bypass in Go crypto/tls during session resumption. If ClientCAs or RootCAs fields are mutated between creating the config and resuming a session, the TLS stack uses the modified trust store, potentially accepting certificates from unintended CAs. CVSS 10.0, PoC available, patch available.

Golang Tls Authentication Bypass +3
NVD VulDB
EPSS 0% CVSS 5.4
MEDIUM This Month

The Greenshift animation and page builder plugin for WordPress (up to version 12.6) fails to properly validate user capabilities on the greenshift_app_pass_validation() function, allowing authenticated subscribers and above to extract sensitive plugin configuration including stored AI API keys and inject malicious scripts through the custom_css setting. This combination of information disclosure and stored cross-site scripting (XSS) requires only valid WordPress user credentials to exploit, with a partial patch available in version 12.6.

WordPress Authentication Bypass XSS
NVD
EPSS 0% CVSS 4.3
MEDIUM PATCH This Month

WeKan versions up to 8.20 contain an authorization bypass in the position history tracking functionality that allows authenticated remote attackers to access sensitive information without proper permissions. The vulnerability exists in the server/methods/positionHistory.js file and can be exploited by any user with login credentials. Upgrading to version 8.21 or later resolves this issue.

Authentication Bypass Wekan
NVD GitHub VulDB
EPSS 0% CVSS 7.8
HIGH POC This Week

Wacom WTabletService 6.6.7-3 contains an unquoted service path vulnerability that allows local attackers to execute malicious code with elevated privileges. Attackers can insert an executable file in the service path to run unauthorized code when the service restarts or the system reboots. [CVSS 7.8 HIGH]

Authentication Bypass
NVD Exploit-DB
EPSS 0% CVSS 8.1
HIGH PATCH This Week

OpenSlides versions prior to 4.2.29 allow unauthorized authentication bypass for SAML-synchronized users through the local login form by using the victim's username with a hardcoded trivial password. An attacker can gain complete access to any SAML user account without knowing their actual credentials, potentially compromising sensitive assembly management data including agendas, motions, and election information. A patch is available in version 4.2.29 and should be applied immediately to all affected instances.

Authentication Bypass Openslides
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM PATCH This Month

The Microsoft Entra ID SSO Login module for Drupal before version 1.0.4 contains an authentication bypass vulnerability that allows unauthenticated attackers to escalate privileges through an alternate authentication channel. An attacker can exploit this flaw to gain unauthorized access with elevated permissions on affected Drupal installations. No patch is currently available, and the vulnerability has low exploit probability (EPSS 0.1%).

Drupal Privilege Escalation Authentication Bypass +1
NVD
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

Bambuddy 3D printer management system has missing authentication (CVSS 9.8) allowing unauthenticated access to printer control and print archive.

Authentication Bypass Bambuddy
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM POC This Month

A vulnerability has been discovered in eladmin v2.7 and before. This vulnerability allows for an arbitrary user password reset under any user permission level. [CVSS 6.5 MEDIUM]

Authentication Bypass Eladmin
NVD GitHub
EPSS 0% CVSS 5.3
MEDIUM This Month

Unauthenticated attackers can manipulate WooCommerce order statuses through an authorization bypass in the Fortis for WooCommerce plugin (versions up to 1.2.0), allowing them to fraudulently mark orders as paid without receiving payment. The vulnerability stems from an inverted nonce validation check in the payment notification handler that fails to properly authenticate requests. This affects all WordPress sites running the vulnerable plugin and has no available patch.

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

The Magic Import Document Extractor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_sync_usage() function in all versions up to, and including, 1.0.4. [CVSS 5.3 MEDIUM]

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 7.5
HIGH This Week

The SEO Flow by LupsOnline plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the checkBlogAuthentication() and checkCategoryAuthentication() functions in all versions up to, and including, 2.2.1. [CVSS 7.5 HIGH]

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 6.5
MEDIUM This Month

Loyalty Points and Rewards for WooCommerce versions up to 5.6.0. is affected by missing authorization (CVSS 6.5).

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 5.3
MEDIUM This Month

The Xendit Payment plugin for WordPress is vulnerable to unauthorized order status manipulation in all versions up to, and including, 6.0.2. This is due to the plugin exposing a publicly accessible WooCommerce API callback endpoint (`wc_xendit_callback`) that processes payment callbacks without any authentication or cryptographic verification that the requests originate from Xendit's payment gateway. This makes it possible for unauthenticated attackers to mark any WooCommerce order as paid by...

WordPress Authentication Bypass
NVD
EPSS 0% CVSS 6.1
MEDIUM This Month

Android versions up to 13.0 contains a vulnerability that allows attackers to bypass the persistence configuration of the application (CVSS 6.1).

Authentication Bypass Android
NVD
EPSS 0% CVSS 5.5
MEDIUM This Month

Android versions up to 14.0 contains a vulnerability that allows attackers to interrupt its functioning (CVSS 5.5).

Authentication Bypass Android
NVD
EPSS 0% CVSS 10.0
CRITICAL Act Now

Synectix LAN 232 TRIO serial-to-ethernet adapter exposes its web management interface without authentication (CVSS 10.0), enabling unauthenticated control of serial devices.

IoT Authentication Bypass
NVD GitHub
EPSS 0% CVSS 9.1
CRITICAL Act Now

MOMA Seismic Station v2.4.2520 exposes its web management interface without authentication, allowing unauthenticated control of seismological monitoring equipment.

Authentication Bypass
NVD GitHub
EPSS 0% CVSS 9.3
CRITICAL PATCH Act Now

Qwik JavaScript framework prior to 1.19.0 has a prototype pollution vulnerability that can lead to server-side code execution in SSR applications.

Denial Of Service Privilege Escalation Authentication Bypass +1
NVD GitHub
EPSS 0%
This Week

Avation Light Engine Pro exposes its configuration and control interface without any authentication or access control.

Authentication Bypass
NVD
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

EspoCRM 5.8.5 has an authentication vulnerability allowing attackers to access other user accounts through IDOR in session handling.

Authentication Bypass Espocrm
NVD Exploit-DB
EPSS 0% CVSS 7.5
HIGH POC This Week

Netis E1+ version 1.2.32533 contains a hardcoded root account vulnerability that allows unauthenticated attackers to access the device with predefined credentials. Attackers can leverage the embedded root account with a crackable password to gain full administrative access to the network device. [CVSS 7.5 HIGH]

Authentication Bypass
NVD Exploit-DB
EPSS 0% CVSS 10.0
CRITICAL POC Act Now

AdminPando 1.0.1 by Fikir Odalari has a CVSS 10.0 SQL injection in the login functionality allowing complete authentication bypass and database takeover.

SQLi Authentication Bypass Fikir Odalari Adminpando
NVD GitHub
EPSS 0% CVSS 8.1
HIGH This Week

Archer Ax53 Firmware versions up to 1.0 contains a vulnerability that allows attackers to obtain device credentials through a specially crafted man‑in‑the‑middle (MITM) a (CVSS 8.1).

TP-Link Authentication Bypass Archer Ax53 Firmware
NVD VulDB
EPSS 0% CVSS 3.1
LOW Monitor

HCL AION is affected by a Permanent Cookie Containing Sensitive Session Information vulnerability. It is storing sensitive session data in persistent cookies may increase the risk of unauthorized access if the cookies are intercepted or compromised. [CVSS 3.1 LOW]

Authentication Bypass
NVD
EPSS 0% CVSS 3.7
LOW Monitor

HCL AION is affected by an Autocomplete HTML Attribute Not Disabled for Password Field vulnerability. This can allow autocomplete on password fields may lead to unintended storage or disclosure of sensitive credentials, potentially increasing the risk of unauthorized access. [CVSS 3.7 LOW]

Authentication Bypass
NVD
EPSS 0% CVSS 7.5
HIGH POC This Week

Open Eclass Platform versions up to 4.2 is affected by authorization bypass through user-controlled key (CVSS 7.5).

Authentication Bypass Open Eclass Platform
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Broken access control in Open eClass Platform versions prior to 4.2 allows authenticated students to create course units, a privilege normally reserved for instructors and administrators. An attacker with valid student credentials can escalate their capabilities within the platform by performing unauthorized administrative actions. Public exploit code exists for this vulnerability, and no patch is currently available.

Authentication Bypass Open Eclass Platform
NVD GitHub
EPSS 0% CVSS 7.8
HIGH POC This Week

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. [CVSS 7.8 HIGH]

Authentication Bypass Open Eclass Platform
NVD GitHub
EPSS 0% CVSS 6.5
MEDIUM POC This Month

Broken access control in Open eClass Platform before version 4.2 allows authenticated students to modify course content that should only be editable by instructors and administrators. Public exploit code exists for this vulnerability, and no patch is currently available for affected deployments. An attacker with valid student credentials can escalate their privileges to alter course materials and potentially disrupt educational content integrity.

Authentication Bypass Open Eclass Platform
NVD GitHub
EPSS 0% CVSS 5.0
MEDIUM This Month

The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. [CVSS 5.0 MEDIUM]

Authentication Bypass Open Eclass Platform
NVD GitHub
EPSS 0% CVSS 10.0
CRITICAL POC Act Now

Dokans SaaS e-commerce platform v3.9.2 has a CVSS 10.0 authentication bypass allowing unauthenticated attackers to obtain sensitive application secrets and tenant data.

Laravel Authentication Bypass Dokans
NVD GitHub
Prev Page 24 of 86 Next

Quick Facts

Typical Severity
CRITICAL
Category
auth
Total CVEs
7654

MITRE ATT&CK

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy