Authentication Bypass
Authentication Bypass vulnerabilities allow attackers to circumvent authentication mechanisms and gain unauthorized access to systems or data without valid credentials.
17
CRITICAL
Auth/Session
Understanding Authentication Bypass
Detailed information about this vulnerability type.
How to Identify
- •Review security advisories
- •Perform regular security testing
Prevention Best Practices
- ✓Follow security best practices
- ✓Keep systems updated
Authentication Bypass CVEs (17)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-13777 | 7.2 | This vulnerability allows an attacker to bypass authentication and gain unauthorized access to ABB AWIN GW100 and GW120 devices, potentially letting them control or manipulate the system. To exploit this, the attacker needs to capture valid authentication data and replay it, which could happen if the data is not properly secured during transmission. | Unknown | Exploit Available | 25 days agoMar 13, 2026 |
| CVE-2019-25520 | 8.8 | This vulnerability allows attackers to gain full administrative access to the PHP stock news site script without needing a valid username or password. They can exploit this by entering specially crafted input in the login form, which tricks the system into bypassing security checks. | jettwebphp stock news site script | Theoretical | 26 days agoMar 12, 2026 |
| CVE-2019-25515 | 8.7 | This vulnerability allows attackers to gain unauthorized access to the administration panel of a PHP stock news site script without needing valid login credentials. They can exploit this by entering specific SQL commands in the username and password fields, making it easy for anyone to take control if they know how to craft the right input. | jettwebphp stock news site script | Exploit Available | 26 days agoMar 12, 2026 |
| CVE-2019-25510 | 8.8 | This vulnerability allows attackers to gain unauthorized access to the administration panel of a PHP stock news site script without needing valid login credentials. By exploiting weaknesses in how the script handles login information, attackers can use specially crafted input to bypass security and control the site. | jettwebphp stock news site script | Exploit Available | 26 days agoMar 12, 2026 |
| CVE-2026-0953 | 9.8 | This vulnerability allows attackers to log in as any existing user, including administrators, by using a valid OAuth token from their own account and the victim's email address. The issue arises because the plugin does not properly check if the email matches the one linked to the OAuth token, making it easy for unauthenticated users to bypass login security. | Unknown | Exploit Available | 28 days agoMar 10, 2026 |
| CVE-2026-30789 | 9.3 | This vulnerability allows an attacker to bypass authentication by reusing session IDs, which means they could gain unauthorized access to a user's account without needing their password. It affects the RustDesk Client versions up to 1.4.5 on multiple platforms, and it requires the attacker to capture a valid session ID from a user. | Unknown | Exploit Available | about 1 month agoMar 5, 2026 |
| CVE-2026-28536 | 8.1 | This vulnerability allows an attacker to bypass authentication on devices running HarmonyOS, potentially giving them unauthorized access to sensitive data and control over the device. To exploit this, the attacker would need to target the device's authentication module, which could lead to serious breaches of privacy and security. | huaweiharmonyos | Theoretical | about 1 month agoMar 5, 2026 |
| CVE-2026-1241 | 8.7 | An attacker can access live video streams from Pelco Sarix Professional 3 Series Cameras without proper login credentials, putting privacy and security at risk. This vulnerability occurs because the camera's web management interface does not properly enforce access controls, allowing unauthorized users to view sensitive footage. | Unknown | Exploit Available | about 1 month agoFeb 26, 2026 |
| CVE-2026-26227 | 6.3 | This vulnerability allows an attacker to gain unauthorized access to the Remote Access Server feature in VLC for Android by repeatedly guessing a one-time password (OTP) without being locked out. The attacker needs to be able to reach the server over the network, and if successful, they can access media files that the legitimate user has shared. | Unknown | Theoretical | about 1 month agoFeb 26, 2026 |
| CVE-2026-2624 | 9.8 | This vulnerability allows an attacker to bypass authentication on the Antikor Next Generation Firewall, potentially giving them unauthorized access to critical functions of the firewall. It affects versions from 2.0.1298 to just before 2.0.1301, meaning that any system running these versions is at risk if not updated. | epatiantikor next generation firewall | Exploit Available | about 1 month agoFeb 25, 2026 |
| CVE-2025-15586 | 10.0 | This vulnerability allows an attacker to bypass authentication and gain access to user accounts without needing the victim's password. It affects specific versions of OGP-Website prior to a certain commit, meaning systems running those versions are at risk if not updated. | Unknown | Exploit Available | about 2 months agoFeb 19, 2026 |
| CVE-2025-13587 | 6.5 | This vulnerability allows an attacker to bypass two-factor authentication on WordPress sites using the affected plugin, enabling them to log in without the second verification step. To exploit this, the attacker simply needs to include any value in the 'token' parameter during the login process, which could even be left empty. | Unknown | Exploit Available | about 2 months agoFeb 19, 2026 |
| CVE-2026-1618 | 8.8 | This vulnerability allows an attacker to gain higher access privileges in the FlexCity/Kiosk software, potentially letting them control the system without proper authentication. It affects versions before 1.0.36, meaning anyone using an older version is at risk. | Unknown | Exploit Available | about 2 months agoFeb 13, 2026 |
| CVE-2024-1709 | 10.0 | This vulnerability allows an attacker to bypass authentication and gain direct access to sensitive information or critical systems in ConnectWise ScreenConnect. It affects versions 23.9.7 and earlier, meaning that if you're using these versions, your system could be at risk. | connectwisescreenconnect | Exploit Available | about 2 years agoFeb 21, 2024 |
| CVE-2022-2368 | 9.8 | This vulnerability allows an attacker to bypass authentication and gain unauthorized access to the Microweber application, potentially letting them control the system or access sensitive data. It affects versions prior to 1.2.20, meaning users running older versions are at risk if they haven't updated. | microwebermicroweber | Exploit Available | over 3 years agoJul 11, 2022 |
| CVE-2020-5849 | 7.5 | This vulnerability allows an attacker to bypass authentication and gain unauthorized access to the Unraid system. It can be exploited without needing any special conditions, making it a serious risk for users running version 6.8.0. | unraidunraid | Exploit Available | about 6 years agoMar 16, 2020 |
| CVE-2019-12749 | 7.1 | This vulnerability allows an attacker to trick a system into thinking they are a different user, potentially gaining unauthorized access to sensitive data or functions. To exploit this, the attacker needs write access to their own home directory and can manipulate a specific file to bypass authentication checks. | freedesktopdbus | Exploit Available | almost 7 years agoJun 11, 2019 |