5581 vulnerabilities classified as CWE-862 (授权机制缺失). AI Chinese analysis included.
CWE-862 represents a critical access control weakness where software fails to verify an actor’s permissions before granting access to resources or executing actions. Attackers typically exploit this flaw by manipulating requests to access sensitive data or perform privileged operations that should be restricted to authorized users. Without proper checks, malicious actors can bypass authentication mechanisms entirely, leading to unauthorized data exposure, modification, or system compromise. Developers mitigate this risk by implementing robust authorization logic at every entry point, ensuring that identity verification is coupled with strict permission validation. This involves checking user roles and access rights against the requested resource before processing any request. By integrating these checks into the application’s core architecture and utilizing established frameworks, teams can prevent unauthorized access and maintain the integrity of their systems against exploitation.
function runEmployeeQuery($dbName, $name){ mysql_select_db($dbName,$globalDbHandle) or die("Could not open Database".$dbName); //Use a prepared statement to avoid CWE-89 $preparedStatement = $globalDbHandle->prepare('SELECT * FROM employees WHERE name = :name'); $preparedStatement->execute(array(':name' => $name)); return $preparedStatement->fetchAll(); } /.../ $employeeRecord = runEmployeeQuery('EmployeeDB',$_GET['EmployeeName']);sub DisplayPrivateMessage { my($id) = @_; my $Message = LookupMessageObject($id); print "From: " . encodeHTML($Message->{from}) . "<br>\n"; print "Subject: " . encodeHTML($Message->{subject}) . "\n"; print "<hr>\n"; print "Body: " . encodeHTML($Message->{body}) . "\n"; } my $q = new CGI; # For purposes of this example, assume that CWE-309 and # CWE-523 do not apply. if (! AuthenticateUser($q->param('username'), $q->param('password'))) { ExitError("invalid username or password"); } my $id = $q->param('id'); DisplayPrivateMessage($id);| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-39103 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 5.5 | - | 2022-10-14 |
| CVE-2022-39107 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-39108 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-39109 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-39110 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-39111 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-10-14 |
| CVE-2022-39112 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 5.5 | - | 2022-10-14 |
| CVE-2022-39113 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 5.5 | - | 2022-10-14 |
| CVE-2022-39114 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 5.5 | - | 2022-10-14 |
| CVE-2022-39115 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 5.5 | - | 2022-10-14 |
| CVE-2022-39117 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 5.5 | - | 2022-10-14 |
| CVE-2022-31765 | Siemens RUGGEDCOM RM1224 安全漏洞 — RUGGEDCOM RM1224 LTE(4G) EU | 8.8 | High | 2022-10-11 |
| CVE-2022-2350 | Disable User Login <= 1.0.1 - Unauthenticated Settings Update — Disable User Login | 5.3 | - | 2022-10-10 |
| CVE-2022-39861 | SAMSUNG Mobile devices 安全漏洞 — FactoryCamera | 5.9 | Medium | 2022-10-07 |
| CVE-2022-3124 | Frontend File Manager < 21.3 - Unauthenticated File Renaming — Frontend File Manager Plugin | 5.3 | - | 2022-10-03 |
| CVE-2022-36068 | Discourse moderators can edit themes via the API — discourse | 7.2 | High | 2022-09-29 |
| CVE-2022-2987 | Ldap WP Login / Active Directory Integration < 3.0.2 - Unauthenticated Settings Update to Auth Bypass — Ldap WP Login / Active Directory Integration | 5.3 | - | 2022-09-26 |
| CVE-2022-2405 | WP Popup Builder < 1.3.0 - Subscriber+ Arbitrary Popup Deletion — WP Popup Builder – Popup Forms , Marketing PoPuP & Newsletter | 4.3 | - | 2022-09-26 |
| CVE-2021-24890 | Scripts Organizer < 3.0 - Unauthenticated Arbitrary File Upload — scripts-organizer | 8.8 | - | 2022-09-26 |
| CVE-2022-36340 | WordPress MailOptin plugin <= 1.2.49.0 - Unauthenticated Optin Campaign Cache Deletion vulnerability — MailOptin (WordPress plugin) | 6.5 | Medium | 2022-09-23 |
| CVE-2022-39119 | UNISOC chipset 安全漏洞 — SC9863A/SC9832E/SC7731E/T610/T310/T606/T760/T610/T618/T606/T612/T616/T760/T770/T820/S8000 | 7.8 | - | 2022-09-09 |
| CVE-2022-36091 | XWiki Platform Web Templates vulnerable to Missing Authorization and Exposure of Private Personal Information to an Unauthorized Actor — xwiki-platform | 7.5 | High | 2022-09-08 |
| CVE-2022-2461 | Transposh WordPress Translation <= 1.0.9.6 - Unauthorized Settings Change — Transposh WordPress Translation | 5.3 | Medium | 2022-09-06 |
| CVE-2022-2657 | Multivendor Marketplace Solution for WooCommerce < 3.8.12 - Unauthorised AJAX Calls — Multivendor Marketplace Solution for WooCommerce – WC Marketplace | 4.3 | - | 2022-09-05 |
| CVE-2022-2543 | Visual Portfolio < 2.18.0 - Unauthenticated CSS Injection — Visual Portfolio, Photo Gallery & Post Grid | 6.1 | - | 2022-09-05 |
| CVE-2022-2376 | Directorist < 7.3.1 - Unauthenticated Email Address Disclosure — Directorist – WordPress Business Directory Plugin with Classified Ads Listings | 5.3 | - | 2022-09-05 |
| CVE-2022-2373 | Simply Schedule Appointments < 1.5.7.7 - Unauthenticated Email Address Disclosure — Simply Schedule Appointments – WordPress Booking Plugin | 5.3 | - | 2022-08-29 |
| CVE-2022-32769 | WWBN AVideo 安全漏洞 — AVideo | 5.0 | - | 2022-08-22 |
| CVE-2022-32768 | WWBN AVideo 安全漏洞 — AVideo | 4.2 | - | 2022-08-22 |
| CVE-2022-2389 | Automations By Autonami < 2.1.2 - Subscriber+ Automation Creation — Abandoned Cart Recovery for WooCommerce, Follow Up Emails, Newsletter Builder & Marketing Automation By Autonami | 4.3 | - | 2022-08-22 |
Vulnerabilities classified as CWE-862 (授权机制缺失) represent 5581 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.