CWE · MITRE source
CWE-279Incorrect Execution-Assigned Permissions
While it is executing, the product sets the permissions of an object in a way that violates the intended permissions that have been specified by the user.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (0)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
| No NIST controls proposed yet. | |||
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2024-37734 | 2.2 | 9.8 | 0.0371 | 2024-06-26 |
CVE-2023-4665 | 1.8 | 8.8 | 0.0056 | 2023-09-15 |
CVE-2022-21699 | 1.7 | 8.2 | 0.0150 | 2022-01-19 |
CVE-2025-14025 | 1.7 | 8.5 | 0.0002 | 2026-01-08 |
CVE-2023-4383 | 1.6 | 7.8 | 0.0003 | 2023-08-16 |
CVE-2024-11220 | 1.6 | 7.8 | 0.0009 | 2024-12-06 |
CVE-2025-22843 | 1.6 | 7.8 | 0.0004 | 2025-05-13 |
CVE-2025-58437 | 1.6 | 8.1 | 0.0005 | 2025-09-06 |
CVE-2025-23263 | 1.5 | 7.6 | 0.0003 | 2025-07-17 |
CVE-2025-30001 | 1.5 | 7.3 | 0.0024 | 2025-10-10 |
CVE-2024-25621 | 1.5 | 7.3 | 0.0000 | 2025-11-06 |
CVE-2026-20062 | 1.4 | 7.2 | 0.0001 | 2026-03-04 |
CVE-2023-3915 | 1.3 | 6.5 | 0.0004 | 2023-09-01 |
CVE-2023-50914 | 1.3 | 6.7 | 0.0008 | 2024-04-30 |
CVE-2024-37025 | 1.3 | 6.7 | 0.0008 | 2024-11-13 |
CVE-2025-13663 | 1.3 | 6.7 | 0.0002 | 2025-12-11 |
CVE-2025-12801 | 1.3 | 6.5 | 0.0001 | 2026-03-04 |
CVE-2020-8025 | 1.2 | 6.1 | 0.0005 | 2020-08-07 |
CVE-2025-20612 | 1.1 | 5.5 | 0.0008 | 2025-05-13 |
CVE-2026-4948 | 1.1 | 5.5 | 0.0002 | 2026-03-27 |
CVE-2017-8441 | 0.9 | 4.3 | 0.0013 | 2017-06-05 |
CVE-2025-26422 | 0.8 | 4.0 | 0.0001 | 2025-09-04 |
CVE-2025-36228 | 0.8 | 3.8 | 0.0001 | 2025-12-26 |
CVE-2024-39286 | 0.7 | 3.3 | 0.0003 | 2025-02-12 |
CVE-2025-23233 | 0.7 | 3.5 | 0.0007 | 2025-05-13 |