Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-4309

Summary
Assigner-NEC
Assigner Org ID-f2760a35-e0d8-4637-ac4c-cc1a2de3e282
Published At-27 Mar, 2026 | 11:46
Updated At-10 Apr, 2026 | 04:10
Rejected At-
Credits

Missing Authorization vulnerability in NEC Platforms, Ltd. Aterm Series allows a attacker to get a specific device information and change the settings via network.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:NEC
Assigner Org ID:f2760a35-e0d8-4637-ac4c-cc1a2de3e282
Published At:27 Mar, 2026 | 11:46
Updated At:10 Apr, 2026 | 04:10
Rejected At:
▼CVE Numbering Authority (CNA)

Missing Authorization vulnerability in NEC Platforms, Ltd. Aterm Series allows a attacker to get a specific device information and change the settings via network.

Affected Products
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm W1200EX(-MS)
Default Status
unknown
Versions
Affected
  • All versions
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG1200HP2
Default Status
unknown
Versions
Affected
  • All versions
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG1900HP
Default Status
unknown
Versions
Affected
  • All versions
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG1200HS2
Default Status
unknown
Versions
Affected
  • All versions
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG1800HP3
Default Status
unknown
Versions
Affected
  • All versions
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG1200HP3
Default Status
unknown
Versions
Affected
  • All versions
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG1900HP2
Default Status
unknown
Versions
Affected
  • All versions
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG1200HS3
Default Status
unknown
Versions
Affected
  • All versions
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG1800HP4
Default Status
unknown
Versions
Affected
  • All versions
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG1200HP4
Default Status
unknown
Versions
Affected
  • All versions
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG1200HS4
Default Status
unknown
Versions
Affected
  • All versions
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WX1500HP
Default Status
unknown
Versions
Affected
  • Before Ver. 1.4.2
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG2600HS
Default Status
unknown
Versions
Affected
  • Before Ver. 1.7.2
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WF1200CR
Default Status
unknown
Versions
Affected
  • Before Ver. 1.6.0
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG1200CR
Default Status
unknown
Versions
Affected
  • Before Ver. 1.5.0
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG2600HP4
Default Status
unknown
Versions
Affected
  • Before Ver. 1.4.2
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG2600HM4
Default Status
unknown
Versions
Affected
  • Before Ver. 1.4.2
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG2600HS2
Default Status
unknown
Versions
Affected
  • Before Ver. 1.3.2
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WX3000HP
Default Status
unknown
Versions
Affected
  • Before Ver. 2.5.0
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WX3600HP
Default Status
unknown
Versions
Affected
  • Before Ver. 1.5.3
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm GX1200HP
Default Status
unknown
Versions
Affected
  • All versions
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm GX1200HS4
Default Status
unknown
Versions
Affected
  • All versions
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm WG1200DM4
Default Status
unknown
Versions
Affected
  • All versions
Vendor
NEC Platforms, Ltd.NEC Platforms, Ltd.
Product
Aterm GB1200PE
Default Status
unknown
Versions
Affected
  • Before Ver. 1.3.1
Problem Types
TypeCWE IDDescription
CWECWE-862CWE-862: Missing Authorization
Type: CWE
CWE ID: CWE-862
Description: CWE-862: Missing Authorization
Metrics
VersionBase scoreBase severityVector
4.06.3MEDIUM
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Version: 4.0
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
Taizoh Tsukamoto of Mitsui Bussan Secure Directions, Inc.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://jpn.nec.com/security-info/secinfo/nv26-001_en.html
N/A
Hyperlink: https://jpn.nec.com/security-info/secinfo/nv26-001_en.html
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt-info@cyber.jp.nec.com
Published At:27 Mar, 2026 | 12:16
Updated At:20 Apr, 2026 | 15:15

Missing Authorization vulnerability in NEC Platforms, Ltd. Aterm Series allows a attacker to get a specific device information and change the settings via network.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.3MEDIUM
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Type: Secondary
Version: 4.0
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CPE Matches

NEC Corporation
nec
>>aterm_wg2600hs_firmware>>Versions before 1.7.2(exclusive)
cpe:2.3:o:nec:aterm_wg2600hs_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg2600hs>>-
cpe:2.3:h:nec:aterm_wg2600hs:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wf1200cr_firmware>>Versions before 1.6.0(exclusive)
cpe:2.3:o:nec:aterm_wf1200cr_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wf1200cr>>-
cpe:2.3:h:nec:aterm_wf1200cr:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1200cr_firmware>>Versions before 1.5.0(exclusive)
cpe:2.3:o:nec:aterm_wg1200cr_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1200cr>>-
cpe:2.3:h:nec:aterm_wg1200cr:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg2600hp4_firmware>>Versions before 1.4.2(exclusive)
cpe:2.3:o:nec:aterm_wg2600hp4_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg2600hp4>>-
cpe:2.3:h:nec:aterm_wg2600hp4:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg2600hm4_firmware>>Versions before 1.4.2(exclusive)
cpe:2.3:o:nec:aterm_wg2600hm4_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg2600hm4>>-
cpe:2.3:h:nec:aterm_wg2600hm4:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg2600hs2_firmware>>Versions before 1.3.2(exclusive)
cpe:2.3:o:nec:aterm_wg2600hs2_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg2600hs2>>-
cpe:2.3:h:nec:aterm_wg2600hs2:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wx3000hp_firmware>>Versions before 2.5.0(exclusive)
cpe:2.3:o:nec:aterm_wx3000hp_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wx3000hp>>-
cpe:2.3:h:nec:aterm_wx3000hp:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wx3600hp_firmware>>Versions up to 1.5.3(inclusive)
cpe:2.3:o:nec:aterm_wx3600hp_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wx3600hp>>-
cpe:2.3:h:nec:aterm_wx3600hp:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_w1200ex-ms_firmware>>*
cpe:2.3:o:nec:aterm_w1200ex-ms_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_w1200ex-ms>>-
cpe:2.3:h:nec:aterm_w1200ex-ms:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1200hp2_firmware>>*
cpe:2.3:o:nec:aterm_wg1200hp2_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1200hp2>>-
cpe:2.3:h:nec:aterm_wg1200hp2:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1900hp_firmware>>*
cpe:2.3:o:nec:aterm_wg1900hp_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1900hp>>-
cpe:2.3:h:nec:aterm_wg1900hp:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1200hs2_firmware>>*
cpe:2.3:o:nec:aterm_wg1200hs2_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1200hs2>>-
cpe:2.3:h:nec:aterm_wg1200hs2:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1800hp3_firmware>>*
cpe:2.3:o:nec:aterm_wg1800hp3_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1800hp3>>-
cpe:2.3:h:nec:aterm_wg1800hp3:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1200hp3_firmware>>*
cpe:2.3:o:nec:aterm_wg1200hp3_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1200hp3>>-
cpe:2.3:h:nec:aterm_wg1200hp3:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1900hp2_firmware>>*
cpe:2.3:o:nec:aterm_wg1900hp2_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1900hp2>>-
cpe:2.3:h:nec:aterm_wg1900hp2:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1200hs3_firmware>>*
cpe:2.3:o:nec:aterm_wg1200hs3_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1200hs3>>-
cpe:2.3:h:nec:aterm_wg1200hs3:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1800hp4_firmware>>*
cpe:2.3:o:nec:aterm_wg1800hp4_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1800hp4>>-
cpe:2.3:h:nec:aterm_wg1800hp4:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1200hp4_firmware>>*
cpe:2.3:o:nec:aterm_wg1200hp4_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1200hp4>>-
cpe:2.3:h:nec:aterm_wg1200hp4:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1200hs4_firmware>>*
cpe:2.3:o:nec:aterm_wg1200hs4_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wg1200hs4>>-
cpe:2.3:h:nec:aterm_wg1200hs4:-:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wx1500hp_firmware>>Versions before 1.4.2(exclusive)
cpe:2.3:o:nec:aterm_wx1500hp_firmware:*:*:*:*:*:*:*:*
NEC Corporation
nec
>>aterm_wx1500hp>>-
cpe:2.3:h:nec:aterm_wx1500hp:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-862Secondarypsirt-info@cyber.jp.nec.com
CWE ID: CWE-862
Type: Secondary
Source: psirt-info@cyber.jp.nec.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://jpn.nec.com/security-info/secinfo/nv26-001_en.htmlpsirt-info@cyber.jp.nec.com
Vendor Advisory
Hyperlink: https://jpn.nec.com/security-info/secinfo/nv26-001_en.html
Source: psirt-info@cyber.jp.nec.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

87Records found

CVE-2026-4621
Matching Score-8
Assigner-NEC Corporation
ShareView Details
Matching Score-8
Assigner-NEC Corporation
CVSS Score-6.3||MEDIUM
EPSS-0.05% / 16.63%
||
7 Day CHG-0.01%
Published-27 Mar, 2026 | 11:52
Updated-20 Apr, 2026 | 15:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hidden Functionality vulnerability in NEC Platforms, Ltd. Aterm Series allows a attacker to enable telnet via network.

Action-Not Available
Vendor-NEC Platforms, Ltd.NEC Corporation
Product-aterm_wg1200hp2aterm_wg1200hp3aterm_wg1800hp4_firmwareaterm_wg2600hm4aterm_w1200ex-ms_firmwareaterm_wg2600hp4_firmwareaterm_wf1200cr_firmwareaterm_wx1500hp_firmwareaterm_wg1900hpaterm_wg1200hs2_firmwareaterm_wg1200cr_firmwareaterm_wg1200hp4_firmwareaterm_wg2600hp4aterm_wg2600hm4_firmwareaterm_wg1200hs4_firmwareaterm_wf1200craterm_wg1800hp3aterm_wx3000hpaterm_wg1900hp_firmwareaterm_wg1200hs3_firmwareaterm_wg1200hp2_firmwareaterm_wg1900hp2_firmwareaterm_wg1200craterm_wx3600hp_firmwareaterm_wg1200hs4aterm_wg2600hsaterm_wg2600hs2_firmwareaterm_wg2600hs2aterm_wx3600hpaterm_wx1500hpaterm_wg1200hp4aterm_wg1200hp3_firmwareaterm_w1200ex-msaterm_wx3000hp_firmwareaterm_wg1200hs2aterm_wg1800hp3_firmwareaterm_wg1800hp4aterm_wx3000hp2_firmwareaterm_wg1200hs3aterm_wx3000hp2aterm_wg2600hs_firmwareaterm_wg1900hp2Aterm WG1200HS3Aterm WG2600HS2Aterm GX1200HS4Aterm WG1200DM4Aterm WG2600HM4Aterm W1200EX(-MS)Aterm WG1800HP3Aterm WX3600HPAterm WG1900HP2Aterm WG1900HPAterm WG2600HP4Aterm WG1200HP4Aterm WX3000HP2Aterm WX3000HPAterm GB1200PEAterm WG1200HP2Aterm WG1200HS4Aterm WG1800HP4Aterm WG1200HS2Aterm WX1500HPAterm WG1200HP3Aterm GX1200HPAterm WG1200CRAterm WF1200CRAterm WG2600HS
CWE ID-CWE-912
Hidden Functionality
CVE-2023-39544
Matching Score-6
Assigner-NEC Corporation
ShareView Details
Matching Score-6
Assigner-NEC Corporation
CVSS Score-8.8||HIGH
EPSS-0.07% / 21.14%
||
7 Day CHG~0.00%
Published-17 Nov, 2023 | 05:28
Updated-29 Aug, 2024 | 14:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CLUSTERPRO X Ver5.1 and earlier and EXPRESSCLUSTER X 5.1 and earlier, CLUSTERPRO X SingleServerSafe 5.1 and earlier, EXPRESSCLUSTER X SingleServerSafe 5.1 and earlier allows a attacker to log in to the product may execute an arbitrary command.

Action-Not Available
Vendor-NEC Corporation
Product-expresscluster_x_singleserversafeexpresscluster_xCLUSTERPRO X(EXPRESSCLUSTER X)CLUSTERPRO X SingleServerSafe (EXPRESSCLUSTER X SingleServerSafe)
CWE ID-CWE-862
Missing Authorization
CVE-2026-3488
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.06% / 17.75%
||
7 Day CHG+0.01%
Published-17 Apr, 2026 | 01:24
Updated-22 Apr, 2026 | 20:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Statistics <= 14.16.4 - Missing Authorization to Authenticated (Subscriber+) Sensitive Information Exposure and Privacy Audit Manipulation

The WP Statistics plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 14.16.4. This is due to missing capability checks on multiple AJAX handlers including `wp_statistics_get_filters`, `wp_statistics_getPrivacyStatus`, `wp_statistics_updatePrivacyStatus`, and `wp_statistics_dismiss_notices`. These endpoints only verify a `wp_rest` nonce via `check_ajax_referer()` but do not enforce any capability checks such as `current_user_can()` or the plugin's own `User::Access()` method. Since the `wp_rest` nonce is available to all authenticated WordPress users, this makes it possible for authenticated attackers, with Subscriber-level access and above, to access sensitive analytics data (user IDs, usernames, emails, visitor tracking data), retrieve and modify privacy audit compliance status, and dismiss administrative notices.

Action-Not Available
Vendor-veronalabs
Product-WP Statistics – Simple, privacy-friendly Google Analytics alternative
CWE ID-CWE-862
Missing Authorization
CVE-2026-33159
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.09% / 25.43%
||
7 Day CHG+0.01%
Published-24 Mar, 2026 | 17:28
Updated-26 Mar, 2026 | 17:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Craft CMS: Unauthenticated users could execute project configuration sync operations that should be restricted trusted users

Craft CMS is a content management system (CMS). From version 4.0.0-RC1 to before version 4.17.8 and from version 5.0.0-RC1 to before version 5.9.14, guest users can access Config Sync updater index, obtain signed data, and execute state-changing Config Sync actions (regenerate-yaml, apply-yaml-changes) without authentication. This issue has been patched in versions 4.17.8 and 5.9.14.

Action-Not Available
Vendor-craftcmscraftcms
Product-craft_cmscms
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-862
Missing Authorization
CVE-2026-33495
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 13.13%
||
7 Day CHG~0.00%
Published-26 Mar, 2026 | 17:26
Updated-02 Apr, 2026 | 21:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ory Oathkeeper has an authentication bypass by usage of untrusted header

ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. Ory Oathkeeper is often deployed behind other components like CDNs, WAFs, or reverse proxies. Depending on the setup, another component might forward the request to the Oathkeeper proxy with a different protocol (http vs. https) than the original request. In order to properly match the request against the configured rules, Oathkeeper considers the `X-Forwarded-Proto` header when evaluating rules. The configuration option `serve.proxy.trust_forwarded_headers` (defaults to false) governs whether this and other `X-Forwarded-*` headers should be trusted. Prior to version 26.2.0, Oathkeeper did not properly respect this configuration, and would always consider the `X-Forwarded-Proto` header. In order for an attacker to abuse this, an installation of Ory Oathkeeper needs to have distinct rules for HTTP and HTTPS requests. Also, the attacker needs to be able to trigger one but not the other rule. In this scenario, the attacker can send the same request but with the `X-Forwarded-Proto` header in order to trigger the other rule. We do not expect many configurations to meet these preconditions. Version 26.2.0 contains a patch. Ory Oathkeeper will correctly respect the `serve.proxy.trust_forwarded_headers` configuration going forward, thereby eliminating the attack scenario. We recommend upgrading to a fixed version even if the preconditions are not met. As an additional mitigation, it is generally recommended to drop any unexpected headers as early as possible when a request is handled, e.g. in the WAF.

Action-Not Available
Vendor-oryory
Product-oathkeeperoathkeeper
CWE ID-CWE-862
Missing Authorization
CVE-2026-33768
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 14.57%
||
7 Day CHG-0.08%
Published-24 Mar, 2026 | 18:40
Updated-26 Mar, 2026 | 13:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Astro: Unauthenticated Path Override via `x-astro-path` / `x_astro_path`

Astro is a web framework. Prior to version 10.0.2, the @astrojs/vercel serverless entrypoint reads the x-astro-path header and x_astro_path query parameter to rewrite the internal request path, with no authentication whatsoever. On deployments without Edge Middleware, this lets anyone bypass Vercel's platform-level path restrictions entirely. The override preserves the original HTTP method and body, so this isn't limited to GET. POST, PUT, DELETE all land on the rewritten path. A Firewall rule blocking /admin/* does nothing when the request comes in as POST /api/health?x_astro_path=/admin/delete-user. This issue has been patched in version 10.0.2.

Action-Not Available
Vendor-astrowithastro
Product-\@astrojs\/vercelastro
CWE ID-CWE-441
Unintended Proxy or Intermediary ('Confused Deputy')
CWE ID-CWE-862
Missing Authorization
CVE-2022-25768
Matching Score-4
Assigner-Mautic
ShareView Details
Matching Score-4
Assigner-Mautic
CVSS Score-7||HIGH
EPSS-0.37% / 58.81%
||
7 Day CHG~0.00%
Published-18 Sep, 2024 | 20:55
Updated-27 Feb, 2025 | 19:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access Control in UI upgrade process

The logic in place to facilitate the update process via the user interface lacks access control to verify if permission exists to perform the tasks. Prior to this patch being applied it might be possible for an attacker to access the Mautic version number or to execute parts of the upgrade process without permission. As upgrading in the user interface is deprecated, this functionality is no longer required.

Action-Not Available
Vendor-acquiaMautic
Product-mauticMautic
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-862
Missing Authorization
CVE-2022-24669
Matching Score-4
Assigner-ForgeRock, Inc.
ShareView Details
Matching Score-4
Assigner-ForgeRock, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.19% / 40.95%
||
7 Day CHG~0.00%
Published-27 Oct, 2022 | 16:53
Updated-06 May, 2025 | 18:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Anonymous users can register / de-register for configuration change notifications

It may be possible to gain some details of the deployment through a well-crafted attack. This may allow that data to be used to probe internal network services.

Action-Not Available
Vendor-ForgeRock, Inc.
Product-access_managementAccess Management
CWE ID-CWE-862
Missing Authorization
CVE-2026-4432
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 14.61%
||
7 Day CHG~0.00%
Published-10 Apr, 2026 | 06:00
Updated-13 Apr, 2026 | 15:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
YITH WooCommerce Wishlist < 4.13.0 - Unauthenticated Arbitrary Wishlist Renaming via IDOR

The YITH WooCommerce Wishlist WordPress plugin before 4.13.0 does not properly validate wishlist ownership in the save_title() AJAX handler before allowing wishlist renaming operations. The function only checks for a valid nonce, which is publicly exposed in the page source of the /wishlist/ page, making it possible for unauthenticated attackers to rename any wishlist belonging to any user on the site.

Action-Not Available
Vendor-Unknown
Product-YITH WooCommerce Wishlist
CWE ID-CWE-862
Missing Authorization
CVE-2025-24737
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.22% / 44.31%
||
7 Day CHG+0.10%
Published-17 Apr, 2025 | 15:48
Updated-23 Apr, 2026 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress WP Helper Premium plugin <= 4.6.1 - Broken Access Control vulnerability

Missing Authorization vulnerability in Mat Bao Corporation WP Helper Premium wp-helper-lite allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WP Helper Premium: from n/a through <= 4.6.1.

Action-Not Available
Vendor-Mat Bao Corporation
Product-WP Helper Premium
CWE ID-CWE-862
Missing Authorization
CVE-2025-67958
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 12.05%
||
7 Day CHG-0.02%
Published-22 Jan, 2026 | 16:51
Updated-27 Apr, 2026 | 18:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress TaxCloud for WooCommerce plugin <= 8.3.8 - Broken Access Control vulnerability

Missing Authorization vulnerability in Taxcloud TaxCloud for WooCommerce simple-sales-tax allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects TaxCloud for WooCommerce: from n/a through <= 8.3.8.

Action-Not Available
Vendor-Taxcloud
Product-TaxCloud for WooCommerce
CWE ID-CWE-862
Missing Authorization
CVE-2025-68558
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 12.05%
||
7 Day CHG-0.02%
Published-22 Jan, 2026 | 16:52
Updated-27 Apr, 2026 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Depicter Slider plugin <= 4.0.4 - Broken Access Control vulnerability

Missing Authorization vulnerability in averta Depicter Slider depicter allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Depicter Slider: from n/a through <= 4.0.4.

Action-Not Available
Vendor-Depicter (Averta)
Product-Depicter Slider
CWE ID-CWE-862
Missing Authorization
CVE-2017-18101
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-6.5||MEDIUM
EPSS-0.38% / 59.71%
||
7 Day CHG~0.00%
Published-10 Apr, 2018 | 13:00
Updated-16 Sep, 2024 | 17:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Various administrative external system import resources in Atlassian JIRA Server (including JIRA Core) before version 7.6.5, from version 7.7.0 before version 7.7.3, from version 7.8.0 before version 7.8.3 and before version 7.9.0 allow remote attackers to run import operations and to determine if an internal service exists through missing permission checks.

Action-Not Available
Vendor-Atlassian
Product-jira_serverjiraJira
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-862
Missing Authorization
CVE-2025-20362
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-57.00% / 98.15%
||
7 Day CHG+10.08%
Published-25 Sep, 2025 | 16:12
Updated-26 Feb, 2026 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-09-26||The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the mitigation steps provided by CISA (URL listed below in Notes) and vendor’s instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.

Update: On November 5, 2025, Cisco became aware of a new attack variant against devices running Cisco Secure ASA Software or Cisco Secure FTD Software releases that are affected by CVE-2025-20333 and CVE-2025-20362. This attack can cause unpatched devices to unexpectedly reload, leading to denial of service (DoS) conditions. Cisco strongly recommends that all customers upgrade to the fixed software releases that are listed in the Fixed Software ["#fs"] section of this advisory. A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints that are related to remote access VPN that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on a device. A successful exploit could allow the attacker to access a restricted URL without authentication.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defenseadaptive_security_appliance_softwareCisco Secure Firewall Adaptive Security Appliance (ASA) SoftwareCisco Secure Firewall Threat Defense (FTD) SoftwareSecure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense
CWE ID-CWE-862
Missing Authorization
CVE-2025-48096
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 10.63%
||
7 Day CHG~0.00%
Published-22 Oct, 2025 | 14:32
Updated-27 Apr, 2026 | 19:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Custom CSS plugin <= 1.4.0 - Broken Access Control vulnerability

Missing Authorization vulnerability in FRESHFACE Custom CSS custom-css-editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Custom CSS: from n/a through <= 1.4.0.

Action-Not Available
Vendor-FRESHFACE
Product-Custom CSS
CWE ID-CWE-862
Missing Authorization
CVE-2025-15115
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-6.9||MEDIUM
EPSS-0.15% / 35.16%
||
7 Day CHG~0.00%
Published-03 Jan, 2026 | 23:33
Updated-03 Feb, 2026 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Petlibro Smart Pet Feeder Platform through 1.7.31 Authentication Bypass via API endpoint

Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an authentication bypass vulnerability that allows unauthenticated attackers to access any user account by exploiting OAuth token validation flaws in the social login system. Attackers can send requests to /member/auth/thirdLogin with arbitrary Google IDs and phoneBrand parameters to obtain full session tokens and account access without proper OAuth verification.

Action-Not Available
Vendor-petlibroPetlibrio
Product-petlibroSmart Pet Feeder Platform
CWE ID-CWE-862
Missing Authorization
CVE-2025-69095
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 12.05%
||
7 Day CHG~0.00%
Published-22 Jan, 2026 | 16:52
Updated-27 Apr, 2026 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Reservation Plugin plugin <= 1.7 - Settings Change vulnerability

Missing Authorization vulnerability in designthemes Reservation Plugin dt-reservation-plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Reservation Plugin: from n/a through <= 1.7.

Action-Not Available
Vendor-designthemes
Product-Reservation Plugin
CWE ID-CWE-862
Missing Authorization
CVE-2025-13880
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.15% / 34.72%
||
7 Day CHG~0.00%
Published-17 Dec, 2025 | 04:31
Updated-08 Apr, 2026 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Social Ninja - Embed Social Feeds, Customer Reviews, Chat Widgets (Google Reviews, YouTube Feed, Photo Feeds, and More) <= 4.0.1 - Missing Authorization to Unauthenticated Plugin's Settings Disclosure And Modification

The WP Social Ninja – Embed Social Feeds, Customer Reviews, Chat Widgets (Google Reviews, YouTube Feed, Photo Feeds, and More) plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the getAdvanceSettings and saveAdvanceSettings functions in all versions up to, and including, 4.0.1. This makes it possible for unauthenticated attackers to view and modify plugin's advanced settings.

Action-Not Available
Vendor-adreastrian
Product-WP Social Ninja – Embed Social Feeds, User Reviews & Chat Widgets
CWE ID-CWE-862
Missing Authorization
CVE-2025-12937
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 26.35%
||
7 Day CHG~0.00%
Published-18 Nov, 2025 | 08:27
Updated-08 Apr, 2026 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ACF Flexible Layouts Manager <= 1.1.6 - Missing Authorization to Unauthenticated Custom Field Update

The ACF Flexible Layouts Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'acf_flm_update_template_with_pasted_layout' function in all versions up to, and including, 1.1.6. This makes it possible for unauthenticated attackers to update custom field values on individual posts and pages.

Action-Not Available
Vendor-valentinpellegrin
Product-ACF Flexible Layouts Manager
CWE ID-CWE-862
Missing Authorization
CVE-2025-11758
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 33.55%
||
7 Day CHG~0.00%
Published-04 Nov, 2025 | 04:27
Updated-08 Apr, 2026 | 17:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
All in One Time Clock Lite – Tracking Employee Time Has Never Been Easier <= 2.0.3 - Missing Authorization to Page Creation and Information Exposure

The All in One Time Clock Lite plugin for WordPress is vulnerable to unauthorized access due to a missing authorization check in all versions up to, and including, 2.0.3. This is due to the plugin exposing admin-level AJAX actions to unauthenticated users via wp_ajax_nopriv_ hooks, while relying only on a nonce check without capability checks. This makes it possible for unauthenticated attackers to create published pages, create shift records with integrity issues, and download time reports containing PII (employee names and work schedules).

Action-Not Available
Vendor-codebangers
Product-All in One Time Clock Lite – Tracking Employee Time Has Never Been Easier
CWE ID-CWE-862
Missing Authorization
CVE-2025-12174
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 10.68%
||
7 Day CHG~0.00%
Published-19 Nov, 2025 | 05:45
Updated-08 Apr, 2026 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings <= 8.5.2 - Missing Authorization to Authenticated (Subscriber+) Data Export and Slug Update

The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'directorist_prepare_listings_export_file' and 'directorist_type_slug_change' AJAX actions in all versions up to, and including, 8.5.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export listing details and change the directorist slug.

Action-Not Available
Vendor-wpwax
Product-Directorist: AI-Powered Business Directory, Listings & Classified Ads
CWE ID-CWE-862
Missing Authorization
CVE-2025-11725
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 20.74%
||
7 Day CHG~0.00%
Published-19 Feb, 2026 | 03:25
Updated-08 Apr, 2026 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Aruba HiSpeed Cache <= 3.0.2 - Missing Authorization to Unauthenticated Plugin's Settings Modification

The Aruba HiSpeed Cache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability checks on the multiple functions in all versions up to, and including, 3.0.2. This makes it possible for unauthenticated attackers to modify plugin's configuration settings, enable or disable features, as well as enable/disable WordPress cron jobs or debug mode

Action-Not Available
Vendor-arubadev
Product-Aruba HiSpeed Cache
CWE ID-CWE-862
Missing Authorization
CVE-2025-0954
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.26% / 49.04%
||
7 Day CHG~0.00%
Published-05 Mar, 2025 | 09:21
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP Online Contract <= 5.1.4 - Missing Authorization to Unauthenticated Settings Import

The WP Online Contract plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the json_import() and json_export() functions in all versions up to, and including, 5.1.4. This makes it possible for unauthenticated attackers to import and export the plugin's settings.

Action-Not Available
Vendor-futuredesigngrp
Product-WP Online Contract
CWE ID-CWE-862
Missing Authorization
CVE-2024-6332
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.68% / 71.64%
||
7 Day CHG~0.00%
Published-05 Sep, 2024 | 09:29
Updated-08 Apr, 2026 | 17:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Booking for Appointments and Events Calendar – Amelia Premium <= 7.7 and Lite <= 1.2.4 - Missing Authorization to Sensitive Information Exposure

The Booking for Appointments and Events Calendar – Amelia Premium and Lite plugins for WordPress are vulnerable to unauthorized access of data due to a missing capability check on the 'ameliaButtonCommand' function in all versions up to, and including, Premium 7.7 and Lite 1.2.4. This makes it possible for unauthenticated attackers to access employee calendar details, including Google Calendar OAuth tokens in the premium version.

Action-Not Available
Vendor-tmsproductsAmeliaameliabooking
Product-ameliaBooking for Appointments and Events Calendar – Amelia ProBooking for Appointments and Events Calendar – Amelia
CWE ID-CWE-862
Missing Authorization
CVE-2017-15680
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.92% / 76.02%
||
7 Day CHG~0.00%
Published-27 Nov, 2020 | 17:34
Updated-05 Aug, 2024 | 19:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Crafter CMS Crafter Studio 3.0.1 an IDOR vulnerability exists which allows unauthenticated attackers to view and modify administrative data.

Action-Not Available
Vendor-craftercmsn/a
Product-crafter_cmsn/a
CWE ID-CWE-862
Missing Authorization
CVE-2026-27362
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 11.37%
||
7 Day CHG~0.00%
Published-05 Mar, 2026 | 05:53
Updated-23 Apr, 2026 | 15:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress WP Bakery Autoresponder Addon plugin <= 1.0.6 - Broken Access Control vulnerability

Missing Authorization vulnerability in kamleshyadav WP Bakery Autoresponder Addon vc-autoresponder-addon allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Bakery Autoresponder Addon: from n/a through <= 1.0.6.

Action-Not Available
Vendor-kamleshyadav
Product-WP Bakery Autoresponder Addon
CWE ID-CWE-862
Missing Authorization
CVE-2024-53813
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.19% / 41.20%
||
7 Day CHG+0.06%
Published-06 Dec, 2024 | 13:07
Updated-23 Apr, 2026 | 15:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress WP Travel plugin <= 9.6.0 - Broken Access Control vulnerability

Missing Authorization vulnerability in WP Travel WP Travel wp-travel allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Travel: from n/a through <= 9.6.0.

Action-Not Available
Vendor-WP Travelwensolutions
Product-WP Travelwp_travel
CWE ID-CWE-862
Missing Authorization
CVE-2026-25034
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 11.37%
||
7 Day CHG-0.01%
Published-25 Mar, 2026 | 16:14
Updated-24 Apr, 2026 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress KiviCare plugin <= 3.6.16 - Broken Access Control vulnerability

Missing Authorization vulnerability in Iqonic Design KiviCare kivicare-clinic-management-system allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects KiviCare: from n/a through <= 3.6.16.

Action-Not Available
Vendor-Iqonic Design
Product-KiviCare
CWE ID-CWE-862
Missing Authorization
CVE-2026-23545
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 11.37%
||
7 Day CHG~0.00%
Published-19 Feb, 2026 | 08:26
Updated-01 Apr, 2026 | 14:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Aruba HiSpeed Cache plugin <= 3.0.4 - Broken Access Control vulnerability

Missing Authorization vulnerability in Aruba.it Dev Aruba HiSpeed Cache aruba-hispeed-cache allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Aruba HiSpeed Cache: from n/a through <= 3.0.4.

Action-Not Available
Vendor-Aruba.it Dev
Product-Aruba HiSpeed Cache
CWE ID-CWE-862
Missing Authorization
CVE-2025-9637
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 26.90%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 09:20
Updated-08 Apr, 2026 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Quiz and Survey Master (QSM) <= 10.3.1 - Missing Authorization to Unpublished, Private And Password-Protected Quiz Information Disclosure And Image Response Uploads

The Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability and status checks on multiple functions in all versions up to, and including, 10.3.1. This makes it possible for unauthenticated attackers to view the details of unpublished, private, or password-protected quizzes, as well as submit file responses to questions from those quizzes, which allow file upload.

Action-Not Available
Vendor-expresstechexpresstech
Product-quiz_and_survey_masterQuiz and Survey Master (QSM) – Easy Quiz and Survey Maker
CWE ID-CWE-862
Missing Authorization
CVE-2024-37481
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.23% / 45.24%
||
7 Day CHG+0.07%
Published-01 Nov, 2024 | 14:18
Updated-23 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress The Post Grid plugin <= 7.7.4 - Broken Access Control vulnerability

Missing Authorization vulnerability in RadiusTheme The Post Grid the-post-grid.This issue affects The Post Grid: from n/a through <= 7.7.4.

Action-Not Available
Vendor-RadiusThemeradiustheme
Product-The Post Gridthe_post_grid
CWE ID-CWE-862
Missing Authorization
CVE-2025-7663
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.14% / 33.05%
||
7 Day CHG~0.00%
Published-08 Nov, 2025 | 03:27
Updated-08 Apr, 2026 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ovatheme Events Manager <= 1.8.6 - Missing Authorization

The Ovatheme Events Manager plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the /class-ovaem-ajax.php file in all versions up to, and including, 1.8.6. This makes it possible for unauthenticated attackers to delete ticket files, download tickets, and more.

Action-Not Available
Vendor-ovatheme
Product-Ovatheme Events Manager
CWE ID-CWE-862
Missing Authorization
CVE-2024-35716
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.46% / 64.01%
||
7 Day CHG~0.00%
Published-11 Jun, 2024 | 09:19
Updated-02 Aug, 2024 | 03:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Copymatic plugin <= 1.9 - Broken Access Control vulnerability

Missing Authorization vulnerability in Copymatic Copymatic – AI Content Writer & Generator.This issue affects Copymatic – AI Content Writer & Generator: from n/a through 1.9.

Action-Not Available
Vendor-copymaticCopymaticcopymatic
Product-copymaticCopymatic – AI Content Writer & Generatorcopymatic
CWE ID-CWE-862
Missing Authorization
CVE-2024-3553
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.30% / 53.17%
||
7 Day CHG~0.00%
Published-02 May, 2024 | 16:52
Updated-08 Apr, 2026 | 19:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tutor LMS <= 2.6.2 - Missing Authorization to Unauthenticated Limited Options Update

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the hide_notices function in all versions up to, and including, 2.6.2. This makes it possible for unauthenticated attackers to enable user registration on sites that may have it disabled.

Action-Not Available
Vendor-Themeum
Product-tutor_lmsTutor LMS – eLearning and online course solutiontutor_lms
CWE ID-CWE-862
Missing Authorization
CVE-2025-69315
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 12.05%
||
7 Day CHG~0.00%
Published-22 Jan, 2026 | 16:52
Updated-01 Apr, 2026 | 14:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Simply Schedule Appointments plugin <= 1.6.9.15 - Broken Access Control vulnerability

Missing Authorization vulnerability in NSquared Simply Schedule Appointments simply-schedule-appointments allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Simply Schedule Appointments: from n/a through <= 1.6.9.15.

Action-Not Available
Vendor-N Squared Digital, LLC
Product-Simply Schedule Appointments
CWE ID-CWE-862
Missing Authorization
CVE-2024-32776
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.19% / 41.31%
||
7 Day CHG~0.00%
Published-10 May, 2024 | 08:43
Updated-09 Jun, 2025 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress AppPresser plugin <= 4.3.0 - Broken Access Control vulnerability

Missing Authorization vulnerability in AppPresser Team AppPresser.This issue affects AppPresser: from n/a through 4.3.0.

Action-Not Available
Vendor-apppresserAppPresser Teamapppresser
Product-apppresserAppPresserapppresser
CWE ID-CWE-862
Missing Authorization
CVE-2025-68072
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 12.05%
||
7 Day CHG~0.00%
Published-22 Jan, 2026 | 16:52
Updated-02 Apr, 2026 | 15:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Easy Property Listings plugin <= 3.5.20 - Broken Access Control vulnerability

Missing Authorization vulnerability in Merv Barrett Easy Property Listings easy-property-listings allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Property Listings: from n/a through <= 3.5.20.

Action-Not Available
Vendor-Merv Barrett
Product-Easy Property Listings
CWE ID-CWE-862
Missing Authorization
CVE-2024-13746
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.20% / 41.38%
||
7 Day CHG~0.00%
Published-01 Mar, 2025 | 04:21
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Booking Calendar and Notification <= 4.0.3 - Missing Authorization via wpcb_all_bookings, wpcb_update_booking_post, and wpcb_delete_posts Functions

The Booking Calendar and Notification plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to missing capability checks on the wpcb_all_bookings(), wpcb_update_booking_post(), and wpcb_delete_posts() functions in all versions up to, and including, 4.0.3. This makes it possible for unauthenticated attackers to extract data, create or update bookings, or delete arbitrary posts.

Action-Not Available
Vendor-imznarf
Product-Booking Calendar and Notification
CWE ID-CWE-862
Missing Authorization
CVE-2024-1763
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.20% / 42.22%
||
7 Day CHG~0.00%
Published-13 Mar, 2024 | 15:26
Updated-08 Apr, 2026 | 18:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Wp Social Login and Register Social Counter <= 3.0.0 - Missing Authorization to Unauthenticated Social Login/Share Status Update

The Wp Social Login and Register Social Counter plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the /wp_social/v1/ REST API endpoint in all versions up to, and including, 3.0.0. This makes it possible for unauthenticated attackers to enable and disable certain providers for the social share and login features.

Action-Not Available
Vendor-wpmetroxnorwpmet
Product-wp_social_login_and_register_social_counterWp Social Login and Register Social Counterwp_social_login_and_register_social_counter
CWE ID-CWE-862
Missing Authorization
CVE-2025-65020
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 13.56%
||
7 Day CHG~0.00%
Published-19 Nov, 2025 | 17:24
Updated-25 Nov, 2025 | 15:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rallly Has Unauthorized Poll Duplication via Insecure Direct Object Reference (IDOR)

Rallly is an open-source scheduling and collaboration tool. Prior to version 4.5.4, an Insecure Direct Object Reference (IDOR) vulnerability in the poll duplication endpoint (/api/trpc/polls.duplicate) allows any authenticated user to duplicate polls they do not own by modifying the pollId parameter. This effectively bypasses access control and lets unauthorized users clone private or administrative polls. This issue has been patched in version 4.5.4.

Action-Not Available
Vendor-ralllylukevella
Product-ralllyrallly
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CWE ID-CWE-862
Missing Authorization
CVE-2019-18790
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-7.42% / 91.76%
||
7 Day CHG~0.00%
Published-22 Nov, 2019 | 16:22
Updated-05 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13.x before 13.29.2, 16.x before 16.6.2, and 17.x before 17.0.1, and Certified Asterisk 13.21 before cert5. A SIP request can be sent to Asterisk that can change a SIP peer's IP address. A REGISTER does not need to occur, and calls can be hijacked as a result. The only thing that needs to be known is the peer's name; authentication details such as passwords do not need to be known. This vulnerability is only exploitable when the nat option is set to the default, or auto_force_rport.

Action-Not Available
Vendor-n/aDebian GNU/LinuxDigium, Inc.
Product-certified_asteriskasteriskdebian_linuxn/a
CWE ID-CWE-862
Missing Authorization
CVE-2024-12266
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.27% / 50.58%
||
7 Day CHG~0.00%
Published-24 Dec, 2024 | 04:22
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ELEX WooCommerce Dynamic Pricing and Discounts <= 2.1.7 - Missing Authorization

The ELEX WooCommerce Dynamic Pricing and Discounts plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the elex_dp_export_rules() and elex_dp_import_rules() functions in all versions up to, and including, 2.1.7. This makes it possible for unauthenticated attackers to import and export product rules along with obtaining phpinfo() data

Action-Not Available
Vendor-elextensions
Product-ELEX WooCommerce Dynamic Pricing and Discounts
CWE ID-CWE-862
Missing Authorization
CVE-2024-4444
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.93% / 76.11%
||
7 Day CHG~0.00%
Published-10 May, 2024 | 08:32
Updated-08 Apr, 2026 | 19:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LearnPress – WordPress LMS Plugin <= 4.2.6.5 - Unauthenticated Bypass to User Registration

The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to bypass to user registration in versions up to, and including, 4.2.6.5. This is due to missing checks in the 'create_account' function in the checkout. This makes it possible for unauthenticated attackers to register as the default role on the site, even if registration is disabled.

Action-Not Available
Vendor-ThimPress (PhysCode)
Product-learnpressLearnPress – WordPress LMS Plugin for Create and Sell Online Courses
CWE ID-CWE-420
Unprotected Alternate Channel
CWE ID-CWE-862
Missing Authorization
CVE-2024-43929
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.38% / 59.53%
||
7 Day CHG~0.00%
Published-01 Nov, 2024 | 14:17
Updated-12 Nov, 2024 | 20:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress JobSearch WP Job Board WordPress Plugin plugin <= 2.5.4 - Broken Access Control vulnerability

Missing Authorization vulnerability in eyecix JobSearch allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects JobSearch: from n/a through 2.5.4.

Action-Not Available
Vendor-eyecixeyecixeyecix
Product-jobsearch_wp_job_boardJobSearchjobsearch_wp_job_board
CWE ID-CWE-862
Missing Authorization
CVE-2024-10598
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.12% / 30.72%
||
7 Day CHG~0.00%
Published-31 Oct, 2024 | 21:31
Updated-04 Nov, 2024 | 19:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tongda OA Annual Leave data.php improper authorization

A vulnerability classified as critical was found in Tongda OA 11.2/11.3/11.4/11.5/11.6. This vulnerability affects unknown code of the file general/hr/setting/attendance/leave/data.php of the component Annual Leave Handler. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-tongda2000Tongdatongda
Product-office_anywhereOAoa_2017
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-862
Missing Authorization
CVE-2024-4341
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 16.95%
||
7 Day CHG~0.00%
Published-08 Jul, 2024 | 13:46
Updated-14 Oct, 2025 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IDOR in ExtremePacs's Extreme XDS

Authorization Bypass Through User-Controlled Key, Missing Authorization vulnerability in ExtremePacs Extreme XDS allows Collect Data as Provided by Users.This issue affects Extreme XDS: before 3928.

Action-Not Available
Vendor-extremepacsExtremePacsextremepacs
Product-extreme_xdsExtreme XDSextreme_xds
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CWE ID-CWE-862
Missing Authorization
CVE-2024-43956
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-6.5||MEDIUM
EPSS-0.44% / 63.22%
||
7 Day CHG~0.00%
Published-01 Nov, 2024 | 14:17
Updated-23 Apr, 2026 | 15:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress MemberPress plugin <= 1.11.34 - Broken Access Control vulnerability

Missing Authorization vulnerability in Caseproof, LLC MemberPress memberpress.This issue affects MemberPress: from n/a through <= 1.11.34.

Action-Not Available
Vendor-caseproofCaseproof, LLCcaseproof
Product-memberpressMemberPressmemberpress
CWE ID-CWE-862
Missing Authorization
CVE-2024-42372
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-6.5||MEDIUM
EPSS-0.12% / 30.53%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 00:25
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization check in SAP NetWeaver AS Java (System Landscape Directory)

Due to missing authorization check in SAP NetWeaver AS Java (System Landscape Directory) an unauthorized user can read and modify some restricted global SLD configurations causing low impact on confidentiality and integrity of the application.

Action-Not Available
Vendor-SAP SE
Product-SAP NetWeaver AS Java (System Landscape Directory)netweaver_system_landscape_directory
CWE ID-CWE-862
Missing Authorization
CVE-2024-42470
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.59% / 69.21%
||
7 Day CHG~0.00%
Published-09 Aug, 2024 | 18:02
Updated-12 Sep, 2024 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CometVisu Backend for openHAB has a sensitive information disclosure vulnerability

openHAB, a provider of open-source home automation software, has add-ons including the visualization add-on CometVisu. Several endpoints in versions prior to 4.2.1 of the CometVisu add-on of openHAB don't require authentication. This makes it possible for unauthenticated attackers to modify or to steal sensitive data. This issue may lead to sensitive information disclosure. Users should upgrade to version 4.2.1 of the CometVisu add-on of openHAB to receive a patch.

Action-Not Available
Vendor-openhabopenhabopenhab
Product-openhabopenhab-webuiopenhab_webui
CWE ID-CWE-862
Missing Authorization
CVE-2024-8632
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.41% / 61.69%
||
7 Day CHG~0.00%
Published-01 Oct, 2024 | 07:30
Updated-08 Apr, 2026 | 18:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
KB Support – WordPress Help Desk and Knowledge Base <= 1.6.6 - Missing Authorization to Unauthenticated Ticket Reply Exposure

The KB Support – WordPress Help Desk and Knowledge Base plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the 'kbs_ajax_load_front_end_replies' and 'kbs_ajax_mark_reply_as_read' functions in all versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to read replies of any ticket, and mark any reply as read.

Action-Not Available
Vendor-logonlogoninccagdasdag
Product-kb_supportKB Support – Customer Support Ticket & Helpdesk Plugin, Knowledge Base Pluginkb_support_wordpress_help_desk_and_knowledge_base
CWE ID-CWE-862
Missing Authorization
  • Previous
  • 1
  • 2
  • Next
Details not found