Cyber Posture

CWE · MITRE source

CWE-289Authentication Bypass by Alternate Name

Abstraction: Base · CVEs in our corpus: 27

The product performs authentication based on the name of a resource being accessed, or the name of the actor performing the access, but it does not properly check all possible names for that resource or actor.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (0)AI

Control Title Family Why it addresses this CWE
No NIST controls proposed yet.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2021-347462.49.80.07622021-09-02
CVE-2023-18032.09.80.00362023-04-14
CVE-2024-565112.09.80.00272025-01-10
CVE-2025-136132.09.80.00372025-12-10
CVE-2026-240582.09.80.00052026-01-22
CVE-2017-165901.98.80.02142018-01-23
CVE-2025-292661.99.60.00272025-03-31
CVE-2023-200461.88.80.00562023-05-09
CVE-2025-551301.89.10.00012026-01-20
CVE-2024-556341.78.10.01152024-12-10
CVE-2024-20981.67.50.01342024-06-13
CVE-2025-643431.67.80.00012025-11-07
CVE-2023-32631.57.50.00072023-08-14
CVE-2023-418901.57.50.00142023-09-19
CVE-2024-519961.57.50.00092024-11-13
CVE-2024-112831.57.50.00092025-03-14
CVE-2025-412481.57.50.00062025-09-16
CVE-2025-603751.57.30.00072025-10-09
CVE-2024-345191.46.80.00032024-05-05
CVE-2023-384871.36.50.00092023-08-04
CVE-2026-320361.36.50.00122026-03-19
CVE-2025-84151.25.90.00052025-08-20
CVE-2025-147771.26.00.00052025-12-16
CVE-2023-516631.15.30.00082023-12-29
CVE-2026-239031.15.30.00102026-02-09