CWE · MITRE source
CWE-277Insecure Inherited Permissions
A product defines a set of insecure permissions that are inherited by objects that are created by the program.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (0)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
| No NIST controls proposed yet. | |||
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2023-27842 | 3.9 | 8.8 | 0.3557 | 2023-03-21 |
CVE-2024-36539 | 2.8 | 9.8 | 0.1398 | 2024-07-24 |
CVE-2024-34329 | 2.2 | 8.4 | 0.0798 | 2024-07-22 |
CVE-2021-41170 | 2.0 | 9.8 | 0.0052 | 2021-11-08 |
CVE-2024-36540 | 2.0 | 9.8 | 0.0026 | 2024-07-24 |
CVE-2024-42681 | 1.9 | 8.8 | 0.0185 | 2024-08-15 |
CVE-2024-6605 | 1.8 | 8.8 | 0.0056 | 2024-07-09 |
CVE-2024-39877 | 1.8 | 8.8 | 0.0013 | 2024-07-17 |
CVE-2024-36542 | 1.8 | 8.8 | 0.0009 | 2024-07-25 |
CVE-2024-29417 | 1.7 | 8.4 | 0.0005 | 2024-05-03 |
CVE-2024-7143 | 1.7 | 8.3 | 0.0004 | 2024-08-07 |
CVE-2023-33990 | 1.6 | 7.8 | 0.0004 | 2023-07-11 |
CVE-2024-23233 | 1.6 | 7.8 | 0.0006 | 2024-03-08 |
CVE-2024-27822 | 1.6 | 7.8 | 0.0011 | 2024-05-14 |
CVE-2024-27848 | 1.6 | 7.8 | 0.0004 | 2024-06-10 |
CVE-2025-58437 | 1.6 | 8.1 | 0.0005 | 2025-09-06 |
CVE-2026-30266 | 1.6 | 7.8 | 0.0002 | 2026-04-20 |
CVE-2020-5343 | 1.5 | 7.3 | 0.0002 | 2020-05-04 |
CVE-2023-34391 | 1.5 | 7.4 | 0.0003 | 2023-08-31 |
CVE-2024-41601 | 1.5 | 7.5 | 0.0015 | 2024-07-19 |
CVE-2025-20008 | 1.5 | 7.7 | 0.0005 | 2025-05-13 |
CVE-2024-27825 | 1.4 | 7.1 | 0.0002 | 2024-05-14 |
CVE-2025-29982 | 1.4 | 6.8 | 0.0004 | 2025-04-02 |
CVE-2025-32797 | 1.4 | 7.0 | 0.0007 | 2025-06-16 |
CVE-2025-37174 | 1.4 | 7.2 | 0.0006 | 2026-01-13 |