Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-269 (特权管理不恰当) — Vulnerability Class 1004

1004 vulnerabilities classified as CWE-269 (特权管理不恰当). AI Chinese analysis included.

CWE-269 represents a critical access control weakness where software fails to properly assign, modify, track, or verify privileges for users or processes. This flaw allows actors to operate outside their intended security boundaries, effectively granting them an unintended sphere of control. Attackers typically exploit this vulnerability by manipulating session tokens, bypassing authentication checks, or leveraging insufficient authorization logic to escalate privileges from a standard user to an administrator. Such exploitation can lead to unauthorized data access, system modification, or complete compromise. To prevent this, developers must implement robust identity and access management frameworks that enforce strict least-privilege principles. Regularly auditing permission assignments, utilizing role-based access control, and rigorously validating user rights at every critical application checkpoint are essential strategies to ensure actors only possess the minimum necessary privileges for their specific tasks.

MITRE CWE Description
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Common Consequences (1)
Access ControlGain Privileges or Assume Identity
Mitigations (3)
Architecture and Design, OperationVery carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.
Architecture and DesignFollow the principle of least privilege when assigning access rights to entities in a software system.
Architecture and DesignConsider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.
Examples (2)
This code temporarily raises the program's privileges to allow creation of a new user folder.
def makeNewUserDir(username): if invalidUsername(username): #avoid CWE-22 and CWE-78 print('Usernames cannot contain invalid characters') return False try: raisePrivileges() os.mkdir('/home/' + username) lowerPrivileges() except OSError: print('Unable to create new user directory for user:' + username) return False return True
Bad · Python
The following example demonstrates the weakness.
seteuid(0); /* do some stuff */ seteuid(getuid());
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2025-9038 S1 Agile Privilege Escalation — S1 Agile Configuration Software 7.8AIHighAI2025-09-22
CVE-2025-34204 Vasion Print (formerly PrinterLogic) Processes Running as Root Inside Docker Instances — Print Virtual Appliance Host 10.0 -2025-09-19
CVE-2025-10650 Improper SSH Key Handling in Internal Debug Builds May Grant Cluster-Level Access to Non-Administrative Users — HyperCloud 9.8AICriticalAI2025-09-18
CVE-2025-34187 Ilevia EVE X1/X5 Server 4.7.18.0.eden Reverse Rootshell — EVE X1/X5 Server 7.2AIHighAI2025-09-16
CVE-2025-53914 Calix GigaCenter ONT (Broadcom SoC) - Excessive Privileges — GigaCenter ONT 9.8AICriticalAI2025-09-09
CVE-2025-53913 Calix GigaCenter ONT (Quantenna SoC) - Excessive Privileges — GigaCenter ONT 8.8AIHighAI2025-09-09
CVE-2025-40594 Siemens多款产品 安全漏洞 — SINAMICS G220 V6.4 6.3 Medium2025-09-09
CVE-2025-43722 Dell PowerScale OneFS 安全漏洞 — PowerScale OneFS 6.7 Medium2025-09-08
CVE-2025-57759 Contao has improper privilege management for page and article fields — contao 4.3 Medium2025-08-28
CVE-2025-53105 GLPI permits unauthorized rules execution order — glpi 7.5 High2025-08-27
CVE-2025-36729 RACOM M!DGE2 Privilege Escalation via SDK Testing Endpoint — M!DGE2 7.2 High2025-08-26
CVE-2025-6366 Event List <= 2.0.4 - Authenticated (Subscriber+) Privilege Escalation — Event List 8.8 High2025-08-26
CVE-2025-5931 Dokan Pro <= 4.0.5 - Authenticated (Vendor+) Privilege Escalation — Dokan Pro 8.8 High2025-08-26
CVE-2025-57760 Langflow Vulnerable to Privilege Escalation via CLI Superuser Creation — langflow 8.8 High2025-08-25
CVE-2025-8309 User privilege escalation vulnerability — Asset Explorer 8.1 High2025-08-20
CVE-2025-6182 Root Certificate Injection — sdm 7.5AIHighAI2025-08-20
CVE-2025-8453 Schneider Electric Saitel DR RTU 安全漏洞 — Saitel DR RTU 6.7 Medium2025-08-20
CVE-2025-8218 Real Spaces - WordPress Properties Directory Theme <= 3.5 - Authenticated (Subscriber+) Privilege Escalation to Administrator via 'change_role_member' — Real Spaces - WordPress Properties Directory Theme 8.8 High2025-08-19
CVE-2025-6758 Real Spaces - WordPress Properties Directory Theme <= 3.6 - Unauthenticated Privilege Escalation to Administrator via 'imic_agent_register' — Real Spaces - WordPress Properties Directory Theme 9.8 Critical2025-08-19
CVE-2025-6080 WPGYM <= 67.7.0 - Missing Authorization to Admin Account Creation — WPGYM - Wordpress Gym Management System 8.8 High2025-08-16
CVE-2025-49758 Microsoft SQL Server Elevation of Privilege Vulnerability — Microsoft SQL Server 2016 Service Pack 3 (GDR) 8.8 High2025-08-12
CVE-2025-54996 OpenBao Root Namespace Operator May Elevate Token Privileges — openbao 7.2 High2025-08-09
CVE-2025-6994 Reveal Listing <= 3.3 - Unauthenticated Privilege Escalation — Reveal Listing 9.8 Critical2025-08-06
CVE-2025-54594 react-native-bottom-tabs: Arbitrary code execution in GitHub Actions canary workflow leads to secret exfiltration — react-native-bottom-tabs 9.1 Critical2025-08-05
CVE-2013-10052 ZPanel zsudo Local Privilege Escalation — ZPanel 7.8AIHighAI2025-08-04
CVE-2012-10022 Kloxo <= 6.1.12 Local Privilege Escalation — Kloxo 8.4 -2025-08-01
CVE-2025-5954 Service Finder SMS System <= 2.0.0 - Unauthenticated Privilege Escalation — Service Finder SMS System 9.8 Critical2025-08-01
CVE-2024-13975 Commvault 11.20.0 - 11.36.0 Windows Access Nodes Compromise via Local File Server Agent Abuse — Commvault 6.7 -2025-07-25
CVE-2025-53942 authentik has an insufficient check for account active status during OAuth/SAML authentication — authentik 7.0 -2025-07-23
CVE-2015-10139 WPLMS Learning Management System for WordPress, WordPress LMS <= 1.8.4.1 - Privilege Escalation — WPLMS Learning Management System for WordPress, WordPress LMS 8.8 High2025-07-19

Vulnerabilities classified as CWE-269 (特权管理不恰当) represent 1004 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.