Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-269 (特权管理不恰当) — Vulnerability Class 1004

1004 vulnerabilities classified as CWE-269 (特权管理不恰当). AI Chinese analysis included.

CWE-269 represents a critical access control weakness where software fails to properly assign, modify, track, or verify privileges for users or processes. This flaw allows actors to operate outside their intended security boundaries, effectively granting them an unintended sphere of control. Attackers typically exploit this vulnerability by manipulating session tokens, bypassing authentication checks, or leveraging insufficient authorization logic to escalate privileges from a standard user to an administrator. Such exploitation can lead to unauthorized data access, system modification, or complete compromise. To prevent this, developers must implement robust identity and access management frameworks that enforce strict least-privilege principles. Regularly auditing permission assignments, utilizing role-based access control, and rigorously validating user rights at every critical application checkpoint are essential strategies to ensure actors only possess the minimum necessary privileges for their specific tasks.

MITRE CWE Description
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Common Consequences (1)
Access ControlGain Privileges or Assume Identity
Mitigations (3)
Architecture and Design, OperationVery carefully manage the setting, management, and handling of privileges. Explicitly manage trust zones in the software.
Architecture and DesignFollow the principle of least privilege when assigning access rights to entities in a software system.
Architecture and DesignConsider following the principle of separation of privilege. Require multiple conditions to be met before permitting access to a system resource.
Examples (2)
This code temporarily raises the program's privileges to allow creation of a new user folder.
def makeNewUserDir(username): if invalidUsername(username): #avoid CWE-22 and CWE-78 print('Usernames cannot contain invalid characters') return False try: raisePrivileges() os.mkdir('/home/' + username) lowerPrivileges() except OSError: print('Unable to create new user directory for user:' + username) return False return True
Bad · Python
The following example demonstrates the weakness.
seteuid(0); /* do some stuff */ seteuid(getuid());
Bad · C
CVE IDTitleCVSSSeverityPublished
CVE-2025-4681 upKeeper Instant Privilege Access 安全漏洞 — upKeeper Instant Privilege Access 7.5AIHighAI2025-06-10
CVE-2025-4601 RH - Real Estate WordPress Theme <= 4.4.0 - Authenticated (Subscriber+) Privilege Escalation — RH - Real Estate WordPress Theme 8.8 High2025-06-10
CVE-2025-26396 SolarWinds Dameware Mini Remote Control Service Incorrect Permissions Local Privilege Escalation Vulnerability — Dameware Mini Remote Control Service 7.8 High2025-06-02
CVE-2025-0358 AXIS OS 安全漏洞 — AXIS OS 8.8 High2025-06-02
CVE-2025-4636 Local Privilege Escalation — Airpointer 7.8 High2025-05-30
CVE-2025-30475 Dell PowerScale InsightIQ 安全漏洞 — PowerScale InsightIQ 8.1 High2025-05-15
CVE-2025-27468 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability — Windows 10 Version 1507 7.0 High2025-05-13
CVE-2025-29976 Microsoft SharePoint Server Elevation of Privilege Vulnerability — Microsoft SharePoint Enterprise Server 2016 7.8 High2025-05-13
CVE-2025-0505 On Arista CloudVision systems (virtual or physical on-premise deployments), Zero Touch Provisioning can be used to gain admin privileges on the CloudVision system, with more permissions than necessary, which can be used to query or manipulate system state — CloudVision Portal 10.0 Critical2025-05-08
CVE-2024-8100 On affected versions of the Arista CloudVision Portal (CVP on-prem), the time-bound device onboarding token can be used to gain admin privileges on CloudVision. — CloudVision 8.7 High2025-05-08
CVE-2025-3852 WPshop 2 – E-Commerce 2.0.0 - 2.6.0 - Authenticated (Subscriber+) Privilege Escalation via Account Takeover — WPshop 2 – E-Commerce 8.8 High2025-05-07
CVE-2025-4335 Woocommerce Multiple Addresses <= 1.0.7.1 - Authenticated (Subscriber+) Privilege Escalation — Woocommerce Multiple Addresses 8.8 High2025-05-07
CVE-2025-47420 User Permissions on Network API — Automate VX 8.8AIHighAI2025-05-06
CVE-2025-3438 MStore API – Create Native Android & iOS Apps On The Cloud <= 4.17.4 - Unauthenticated Limited Privilege Escalation — MStore API – Create Native Android & iOS Apps On The Cloud 6.5 Medium2025-05-02
CVE-2025-3224 Elevation of Privilege in Docker Desktop for Windows during Upgrade due to Insecure Directory Deletion — Docker Desktop 7.8AIHighAI2025-04-28
CVE-2025-46576 ZTE GoldenDB Database product has a privilege escalation vulnerability — GoldenDB 5.4 Medium2025-04-27
CVE-2025-2238 Vikinger <= 1.9.30 - Authenticated (Subscriber+) Privilege Escalation via 'vikinger_user_meta_update_ajax' — Vikinger 8.8 High2025-04-25
CVE-2025-3101 Configurator Theme Core <= 1.4.7 - Authenticated (Subscriber+) Privilege Escalation — Configurator Theme Core 8.8 High2025-04-24
CVE-2025-3761 My Tickets – Accessible Event Ticketing <= 2.0.16 - Authenticated (Subscriber+) Privilege Escalation — My Tickets – Accessible Event Ticketing 8.8 High2025-04-24
CVE-2025-1732 Zyxel USG FLEX 安全漏洞 — USG FLEX H series uOS firmware 6.7 Medium2025-04-22
CVE-2025-3278 UrbanGo Membership <= 1.0.4 - Unauthenticated Privilege Escalation — UrbanGo Membership 9.8 Critical2025-04-19
CVE-2023-32197 Rancher's External RoleTemplates can lead to privilege escalation — rancher 6.6 Medium2025-04-16
CVE-2024-22036 Rancher Remote Code Execution via Cluster/Node Drivers — rancher 9.1 Critical2025-04-16
CVE-2025-3418 WPC Admin Columns 2.0.6 - 2.1.0 - Authenticated (Subscriber+) Privilege Escalation via User Meta Update — WPC Admin Columns 8.8 High2025-04-12
CVE-2025-29800 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability — Microsoft AutoUpdate for Mac 7.8 High2025-04-08
CVE-2025-29999 Siemens License Server 安全漏洞 — Siemens License Server (SLS) 6.7 Medium2025-04-08
CVE-2025-2798 Woffice <= 5.4.21 - Authentication Bypass via Registration Role — Woffice CRM 9.8 Critical2025-04-04
CVE-2025-3105 Vehica Core <= 1.0.97 - Authenticated (Subscriber+) Privilege Escalation — Vehica Core 8.8 High2025-04-04
CVE-2025-31286 Trend Vision One 安全漏洞 — Trend Vision One 4.6 Medium2025-04-02
CVE-2025-31285 Trend Vision One 安全漏洞 — Trend Vision One 4.6 Medium2025-04-02

Vulnerabilities classified as CWE-269 (特权管理不恰当) represent 1004 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.