5653 vulnerabilities classified as CWE-862 (授权机制缺失). AI Chinese analysis included.
CWE-862 represents a critical access control weakness where software fails to verify an actor’s permissions before granting access to resources or executing actions. Attackers typically exploit this flaw by manipulating requests to access sensitive data or perform privileged operations that should be restricted to authorized users. Without proper checks, malicious actors can bypass authentication mechanisms entirely, leading to unauthorized data exposure, modification, or system compromise. Developers mitigate this risk by implementing robust authorization logic at every entry point, ensuring that identity verification is coupled with strict permission validation. This involves checking user roles and access rights against the requested resource before processing any request. By integrating these checks into the application’s core architecture and utilizing established frameworks, teams can prevent unauthorized access and maintain the integrity of their systems against exploitation.
function runEmployeeQuery($dbName, $name){ mysql_select_db($dbName,$globalDbHandle) or die("Could not open Database".$dbName); //Use a prepared statement to avoid CWE-89 $preparedStatement = $globalDbHandle->prepare('SELECT * FROM employees WHERE name = :name'); $preparedStatement->execute(array(':name' => $name)); return $preparedStatement->fetchAll(); } /.../ $employeeRecord = runEmployeeQuery('EmployeeDB',$_GET['EmployeeName']);sub DisplayPrivateMessage { my($id) = @_; my $Message = LookupMessageObject($id); print "From: " . encodeHTML($Message->{from}) . "<br>\n"; print "Subject: " . encodeHTML($Message->{subject}) . "\n"; print "<hr>\n"; print "Body: " . encodeHTML($Message->{body}) . "\n"; } my $q = new CGI; # For purposes of this example, assume that CWE-309 and # CWE-523 do not apply. if (! AuthenticateUser($q->param('username'), $q->param('password'))) { ExitError("invalid username or password"); } my $id = $q->param('id'); DisplayPrivateMessage($id);| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-3337 | Lock WARP switch bypass by removing VPN profile on iOS mobile client — WARP | 6.7 | Medium | 2022-10-28 |
| CVE-2022-3321 | Lock WARP switch feature bypass on WARP mobile client for iOS — WARP | 6.7 | Medium | 2022-10-28 |
| CVE-2022-3512 | Lock WARP switch bypass using warp-cli 'add-trusted-ssid' command — WARP | 6.7 | Medium | 2022-10-28 |
| CVE-2022-24669 | Anonymous users can register / de-register for configuration change notifications — Access Management | 6.5 | Medium | 2022-10-27 |
| CVE-2022-39233 | Tuleap subject to Missing Authorization allowing for branch prefix modification — tuleap | 4.3 | Medium | 2022-10-19 |
| CVE-2022-3244 | Import all XML, CSV & TXT into WordPress < 6.5.8 - Missing Authorisation — Import all XML, CSV & TXT into WordPress | 4.2 | - | 2022-10-17 |
| CVE-2022-2985 | Google Android 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-38669 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-38670 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-38697 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.1 | - | 2022-10-14 |
| CVE-2022-38698 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-39080 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-39103 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 5.5 | - | 2022-10-14 |
| CVE-2022-39107 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-39108 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-39109 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-39110 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-39111 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-39112 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 5.5 | - | 2022-10-14 |
| CVE-2022-39113 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 5.5 | - | 2022-10-14 |
| CVE-2022-39114 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 5.5 | - | 2022-10-14 |
| CVE-2022-39115 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 5.5 | - | 2022-10-14 |
| CVE-2022-39117 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 5.5 | - | 2022-10-14 |
| CVE-2022-31765 | Siemens RUGGEDCOM RM1224 安全漏洞 — RUGGEDCOM RM1224 LTE(4G) EU | 8.8 | High | 2022-10-11 |
| CVE-2022-2350 | Disable User Login <= 1.0.1 - Unauthenticated Settings Update — Disable User Login | 5.3 | - | 2022-10-10 |
| CVE-2022-39861 | SAMSUNG Mobile devices 安全漏洞 — FactoryCamera | 5.9 | Medium | 2022-10-07 |
| CVE-2022-3124 | Frontend File Manager < 21.3 - Unauthenticated File Renaming — Frontend File Manager Plugin | 5.3 | - | 2022-10-03 |
| CVE-2022-36068 | Discourse moderators can edit themes via the API — discourse | 7.2 | High | 2022-09-29 |
| CVE-2022-2987 | Ldap WP Login / Active Directory Integration < 3.0.2 - Unauthenticated Settings Update to Auth Bypass — Ldap WP Login / Active Directory Integration | 5.3 | - | 2022-09-26 |
| CVE-2022-2405 | WP Popup Builder < 1.3.0 - Subscriber+ Arbitrary Popup Deletion — WP Popup Builder – Popup Forms , Marketing PoPuP & Newsletter | 4.3 | - | 2022-09-26 |
Vulnerabilities classified as CWE-862 (授权机制缺失) represent 5653 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.