CWE · MITRE source
CWE-289Authentication Bypass by Alternate Name
The product performs authentication based on the name of a resource being accessed, or the name of the actor performing the access, but it does not properly check all possible names for that resource or actor.
Last updated: 09 May 2026 03:25 UTC
NIST 800-53 r5 controls that address this weakness (0)AI
| Control | Title | Family | Why it addresses this CWE |
|---|---|---|---|
| No NIST controls proposed yet. | |||
Top CVEs of this weakness type, ranked by Risk Priority
| CVE | Risk | CVSS | EPSS | Published |
|---|---|---|---|---|
CVE-2021-34746 | 2.4 | 9.8 | 0.0762 | 2021-09-02 |
CVE-2023-1803 | 2.0 | 9.8 | 0.0036 | 2023-04-14 |
CVE-2024-56511 | 2.0 | 9.8 | 0.0027 | 2025-01-10 |
CVE-2025-13613 | 2.0 | 9.8 | 0.0037 | 2025-12-10 |
CVE-2026-24058 | 2.0 | 9.8 | 0.0005 | 2026-01-22 |
CVE-2017-16590 | 1.9 | 8.8 | 0.0214 | 2018-01-23 |
CVE-2025-29266 | 1.9 | 9.6 | 0.0027 | 2025-03-31 |
CVE-2023-20046 | 1.8 | 8.8 | 0.0056 | 2023-05-09 |
CVE-2025-55130 | 1.8 | 9.1 | 0.0001 | 2026-01-20 |
CVE-2024-55634 | 1.7 | 8.1 | 0.0115 | 2024-12-10 |
CVE-2024-2098 | 1.6 | 7.5 | 0.0134 | 2024-06-13 |
CVE-2025-64343 | 1.6 | 7.8 | 0.0001 | 2025-11-07 |
CVE-2023-3263 | 1.5 | 7.5 | 0.0007 | 2023-08-14 |
CVE-2023-41890 | 1.5 | 7.5 | 0.0014 | 2023-09-19 |
CVE-2024-51996 | 1.5 | 7.5 | 0.0009 | 2024-11-13 |
CVE-2024-11283 | 1.5 | 7.5 | 0.0009 | 2025-03-14 |
CVE-2025-41248 | 1.5 | 7.5 | 0.0006 | 2025-09-16 |
CVE-2025-60375 | 1.5 | 7.3 | 0.0007 | 2025-10-09 |
CVE-2024-34519 | 1.4 | 6.8 | 0.0003 | 2024-05-05 |
CVE-2023-38487 | 1.3 | 6.5 | 0.0009 | 2023-08-04 |
CVE-2026-32036 | 1.3 | 6.5 | 0.0012 | 2026-03-19 |
CVE-2025-8415 | 1.2 | 5.9 | 0.0005 | 2025-08-20 |
CVE-2025-14777 | 1.2 | 6.0 | 0.0005 | 2025-12-16 |
CVE-2023-51663 | 1.1 | 5.3 | 0.0008 | 2023-12-29 |
CVE-2026-23903 | 1.1 | 5.3 | 0.0010 | 2026-02-09 |