目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-306 关键功能的认证机制缺失 类漏洞列表 1115

CWE-306 关键功能的认证机制缺失 类弱点 1115 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-306指关键功能缺乏身份验证,属于访问控制缺陷。攻击者可直接调用需高权限或消耗大量资源的功能,无需提供凭证,从而实施未授权操作或资源耗尽攻击。开发者应确保所有敏感操作强制实施身份验证机制,严格校验用户身份,防止未认证请求访问关键业务逻辑,保障系统安全。

MITRE CWE 官方描述
CWE:CWE-306 关键功能缺少身份验证 (Missing Authentication for Critical Function) 英文:该产品对于需要可证明的用户身份或消耗大量资源的功能,未执行任何身份验证 (authentication)。
常见影响 (1)
Access Control, OtherGain Privileges or Assume Identity, Varies by Context
Exposing critical functionality essentially provides an attacker with the privilege level of that functionality. The consequences will depend on the associated functionality, but they can range from reading or modifying sensitive data, accessing administrative or other privileged functionality, or p…
缓解措施 (5)
Architecture and DesignDivide the software into anonymous, normal, privileged, and administrative areas. Identify which of these areas require a proven user identity, and use a centralized authentication capability. Identify all potential communication channels, or other means of interaction with the software, to ensure that all channels are appropriately protected, including those channels that are assumed to be access…
Architecture and DesignFor any security checks that are performed on the client side, ensure that these checks are duplicated on the server side, in order to avoid CWE-602. Attackers can bypass the client-side checks by modifying values after the checks have been performed, or by changing the client to remove the client-side checks entirely. Then, these modified values would be submitted to the server.
Architecture and DesignWhere possible, avoid implementing custom, "grow-your-own" authentication routines and consider using authentication capabilities as provided by the surrounding framework, operating system, or environment. These capabilities may avoid common weaknesses that are unique to authentication; support automatic auditing and tracking; and make it easier to provide a clear separation between authentication…
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. For example, consider using libraries with authentication capabilities such as OpenSSL or the ESAPI Authenticator [REF-45].
Implementation, System Configuration, OperationWhen storing data in the cloud (e.g., S3 buckets, Azure blobs, Google Cloud Storage, etc.), use the provider's controls to require strong authentication for users who should be allowed to access the data [REF-1297] [REF-1298] [REF-1302].
代码示例 (2)
In the following Java example the method createBankAccount is used to create a BankAccount object for a bank management application.
public BankAccount createBankAccount(String accountNumber, String accountType, String accountName, String accountSSN, double balance) { BankAccount account = new BankAccount(); account.setAccountNumber(accountNumber); account.setAccountType(accountType); account.setAccountOwnerName(accountName); account.setAccountOwnerSSN(accountSSN); account.setBalance(balance); return account; }
Bad · Java
private boolean isUserAuthentic = false; // authenticate user, // if user is authenticated then set variable to true // otherwise set variable to false public boolean authenticateUser(String username, String password) { ... } public BankAccount createNewBankAccount(String accountNumber, String accountType, String accountName, String accountSSN, double balance) { BankAccount account = null; if (isUserAuthentic) { account = new BankAccount(); account.setAccountNumber(accountNumber); account.setAccountType(accountType); account.setAccountOwnerName(accountName); account.setAccountOwnerSSN(accountS
Good · Java
In 2022, the OT:ICEFALL study examined products by 10 different Operational Technology (OT) vendors. The researchers reported 56 vulnerabilities and said that the products were "insecure by design" [REF-1283]. If exploited, these vulnerabilities often allowed adversaries to change how the products operated, ranging from denial of service to changing the code that the products executed. Since these…
CVE ID标题CVSS风险等级Published
CVE-2026-42302 FastGPT 代码服务器配置错误导致远程代码执行漏洞 — FastGPT 9.8 Critical2026-05-08
CVE-2026-42176 Scoold JWT伪造持久化管理员接管漏洞 — scoold 6.7 Medium2026-05-08
CVE-2026-44338 PraisonAI 默认禁用认证的遗留API导致未授权工作流执行漏洞 — PraisonAI 7.3 High2026-05-08
CVE-2026-6736 GitHub Enterprise Server 创建本地用户账户越权漏洞 — Enterprise Server--2026-05-07
CVE-2026-7415 Yarbo机器人固件MQTT编排缺乏读写ACL控制漏洞 — Firmware 9.8 Critical2026-05-07
CVE-2026-41930 Vvveb <1.0.8.2 phpMyAdmin 硬编码凭据信息泄露漏洞 — Vvveb 9.8 Critical2026-05-06
CVE-2026-8031 PicoTronica e-Clinic ECHS API 患者记录缺失认证漏洞 — e-Clinic Healthcare System ECHS 5.3 Medium2026-05-06
CVE-2026-7844 Langchain-Chatchat delete_file 缺少认证漏洞 — Langchain-Chatchat 6.3 Medium2026-05-05
CVE-2023-54344 Eclipse Equinox OSGi 3.7.2 远程代码执行漏洞 — [OSGi 9.8 Critical2026-05-05
CVE-2023-54342 Eclipse Equinox OSGi 3.8-3.18 控制台远程代码执行漏洞 — [OSGi 9.8 Critical2026-05-05
CVE-2026-42222 nginx-ui 未授权实例接管漏洞 — nginx-ui 8.1 High2026-05-04
CVE-2026-42221 nginx-ui 未授权首次安装允许远程管理员接管漏洞 — nginx-ui 8.1 High2026-05-04
CVE-2026-42796 Arelle <2.39.10 未认证远程代码执行漏洞 — Arelle 9.8 Critical2026-05-04
CVE-2026-7723 Prefect WebSocket 端点缺少身份验证漏洞 — prefect 7.3 High2026-05-04
CVE-2026-7714 Calibre-Web 管理接口缺少身份验证漏洞 — Calibre-Web-Automated 6.5 Medium2026-05-04
CVE-2026-35514 Chartbrew 用户注册接口绕过限制漏洞 — chartbrew 6.5 Medium2026-04-30
CVE-2025-13030 django-mdeditor任意版本:图片上传缺少认证致代码执行 — django-mdeditor 7.1 High2026-04-30
CVE-2026-41940 cPanel 访问控制错误漏洞 — cPanel 9.8 Critical2026-04-29
CVE-2026-3893 Carlson VASCO-B GNSS Receiver 访问控制错误漏洞 — VASCO-B GNSS Receiver 9.4 Critical2026-04-28
CVE-2026-5944 Nutanix Prism Central 访问控制错误漏洞 — Cisco Intersight Device Connector for Prism Central 8.2 High2026-04-28
CVE-2026-3323 VEGA VEGAPULS 6X 访问控制错误漏洞 — VEGAPULS 6X Two-wire PROFINET, Modbus TCP, OPC UA (Ethernet-APL) 7.5 High2026-04-28
CVE-2024-54013 Hanwha Vision QND-8080R 访问控制错误漏洞 — QND-8080R 9.1AICriticalAI2026-04-28
CVE-2026-7113 Hermes Agent 授权问题漏洞 — hermes-agent 5.6 Medium2026-04-27
CVE-2026-7042 MiroFish 授权问题漏洞 — MiroFish 7.3 High2026-04-26
CVE-2026-41473 CyberPanel 访问控制错误漏洞 — cyberpanel 9.1AICriticalAI2026-04-24
CVE-2026-41477 deskflow 访问控制错误漏洞 — deskflow 7.8 High2026-04-24
CVE-2026-6272 KUKSA.val 访问控制错误漏洞 — Eclipse KUKSA - Databroker 7.1AIHighAI2026-04-24
CVE-2026-25775 SenseLive X3050 访问控制错误漏洞 — X3050 9.8 Critical2026-04-24
CVE-2026-35064 SenseLive X3050 访问控制错误漏洞 — X3050 7.5 High2026-04-24
CVE-2026-40620 SenseLive X3050 访问控制错误漏洞 — X3050 9.8 Critical2026-04-24

CWE-306(关键功能的认证机制缺失) 是常见的弱点类别,本平台收录该类弱点关联的 1115 条 CVE 漏洞。