Authentication Bypass

Authentication Bypass vulnerabilities allow attackers to circumvent authentication mechanisms and gain unauthorized access to systems or data without valid credentials.

Total CVEs

17

Typical Severity

CRITICAL

Category

Auth/Session

Understanding Authentication Bypass

Detailed information about this vulnerability type.

How to Identify

  • Review security advisories
  • Perform regular security testing

Prevention Best Practices

  • Follow security best practices
  • Keep systems updated

Authentication Bypass CVEs (17)

DescriptionVendor / ProductExploit Status
CVE-2025-137777.2

This vulnerability allows an attacker to bypass authentication and gain unauthorized access to ABB AWIN GW100 and GW120 devices, potentially letting them control or manipulate the system. To exploit this, the attacker needs to capture valid authentication data and replay it, which could happen if the data is not properly secured during transmission.

Unknown
Exploit Available
25 days agoMar 13, 2026
CVE-2019-255208.8

This vulnerability allows attackers to gain full administrative access to the PHP stock news site script without needing a valid username or password. They can exploit this by entering specially crafted input in the login form, which tricks the system into bypassing security checks.

jettwebphp stock news site script
Theoretical
26 days agoMar 12, 2026
CVE-2019-255158.7

This vulnerability allows attackers to gain unauthorized access to the administration panel of a PHP stock news site script without needing valid login credentials. They can exploit this by entering specific SQL commands in the username and password fields, making it easy for anyone to take control if they know how to craft the right input.

jettwebphp stock news site script
Exploit Available
26 days agoMar 12, 2026
CVE-2019-255108.8

This vulnerability allows attackers to gain unauthorized access to the administration panel of a PHP stock news site script without needing valid login credentials. By exploiting weaknesses in how the script handles login information, attackers can use specially crafted input to bypass security and control the site.

jettwebphp stock news site script
Exploit Available
26 days agoMar 12, 2026
CVE-2026-09539.8

This vulnerability allows attackers to log in as any existing user, including administrators, by using a valid OAuth token from their own account and the victim's email address. The issue arises because the plugin does not properly check if the email matches the one linked to the OAuth token, making it easy for unauthenticated users to bypass login security.

Unknown
Exploit Available
28 days agoMar 10, 2026
CVE-2026-307899.3

This vulnerability allows an attacker to bypass authentication by reusing session IDs, which means they could gain unauthorized access to a user's account without needing their password. It affects the RustDesk Client versions up to 1.4.5 on multiple platforms, and it requires the attacker to capture a valid session ID from a user.

Unknown
Exploit Available
about 1 month agoMar 5, 2026
CVE-2026-285368.1

This vulnerability allows an attacker to bypass authentication on devices running HarmonyOS, potentially giving them unauthorized access to sensitive data and control over the device. To exploit this, the attacker would need to target the device's authentication module, which could lead to serious breaches of privacy and security.

huaweiharmonyos
Theoretical
about 1 month agoMar 5, 2026
CVE-2026-12418.7

An attacker can access live video streams from Pelco Sarix Professional 3 Series Cameras without proper login credentials, putting privacy and security at risk. This vulnerability occurs because the camera's web management interface does not properly enforce access controls, allowing unauthorized users to view sensitive footage.

Unknown
Exploit Available
about 1 month agoFeb 26, 2026
CVE-2026-262276.3

This vulnerability allows an attacker to gain unauthorized access to the Remote Access Server feature in VLC for Android by repeatedly guessing a one-time password (OTP) without being locked out. The attacker needs to be able to reach the server over the network, and if successful, they can access media files that the legitimate user has shared.

Unknown
Theoretical
about 1 month agoFeb 26, 2026
CVE-2026-26249.8

This vulnerability allows an attacker to bypass authentication on the Antikor Next Generation Firewall, potentially giving them unauthorized access to critical functions of the firewall. It affects versions from 2.0.1298 to just before 2.0.1301, meaning that any system running these versions is at risk if not updated.

epatiantikor next generation firewall
Exploit Available
about 1 month agoFeb 25, 2026
CVE-2025-1558610.0

This vulnerability allows an attacker to bypass authentication and gain access to user accounts without needing the victim's password. It affects specific versions of OGP-Website prior to a certain commit, meaning systems running those versions are at risk if not updated.

Unknown
Exploit Available
about 2 months agoFeb 19, 2026
CVE-2025-135876.5

This vulnerability allows an attacker to bypass two-factor authentication on WordPress sites using the affected plugin, enabling them to log in without the second verification step. To exploit this, the attacker simply needs to include any value in the 'token' parameter during the login process, which could even be left empty.

Unknown
Exploit Available
about 2 months agoFeb 19, 2026
CVE-2026-16188.8

This vulnerability allows an attacker to gain higher access privileges in the FlexCity/Kiosk software, potentially letting them control the system without proper authentication. It affects versions before 1.0.36, meaning anyone using an older version is at risk.

Unknown
Exploit Available
about 2 months agoFeb 13, 2026
CVE-2024-170910.0

This vulnerability allows an attacker to bypass authentication and gain direct access to sensitive information or critical systems in ConnectWise ScreenConnect. It affects versions 23.9.7 and earlier, meaning that if you're using these versions, your system could be at risk.

connectwisescreenconnect
Exploit Available
about 2 years agoFeb 21, 2024
CVE-2022-23689.8

This vulnerability allows an attacker to bypass authentication and gain unauthorized access to the Microweber application, potentially letting them control the system or access sensitive data. It affects versions prior to 1.2.20, meaning users running older versions are at risk if they haven't updated.

microwebermicroweber
Exploit Available
over 3 years agoJul 11, 2022
CVE-2020-58497.5

This vulnerability allows an attacker to bypass authentication and gain unauthorized access to the Unraid system. It can be exploited without needing any special conditions, making it a serious risk for users running version 6.8.0.

unraidunraid
Exploit Available
about 6 years agoMar 16, 2020
CVE-2019-127497.1

This vulnerability allows an attacker to trick a system into thinking they are a different user, potentially gaining unauthorized access to sensitive data or functions. To exploit this, the attacker needs write access to their own home directory and can manipulate a specific file to bypass authentication checks.

freedesktopdbus
Exploit Available
almost 7 years agoJun 11, 2019