Cyber Posture

CWE · MITRE source

CWE-302Authentication Bypass by Assumed-Immutable Data

Abstraction: Base · CVEs in our corpus: 34

The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (1)AI

Control Title Family Why it addresses this CWE
IA-8Identification and Authentication (Non-organizational Users)IAProper authentication for non-organizational users counters bypasses relying on assumed-immutable data.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2024-434417.49.80.90422024-12-24
CVE-2016-94822.49.80.07002018-07-13
CVE-2025-298132.210.00.02902025-05-08
CVE-2023-46692.09.80.00082023-09-14
CVE-2023-46122.09.80.00042023-11-09
CVE-2024-564042.09.90.00302025-01-24
CVE-2025-632102.09.80.00142025-11-19
CVE-2022-227291.88.80.00142022-03-11
CVE-2024-128381.88.80.00062024-12-31
CVE-2025-471581.89.00.00262025-07-18
CVE-2026-402851.88.80.00042026-04-17
CVE-2024-490561.67.30.02472024-11-12
CVE-2025-248761.68.10.00162025-02-11
CVE-2025-88551.68.10.00062025-11-14
CVE-2026-394291.68.20.00082026-04-08
CVE-2020-150741.57.50.00192020-07-14
CVE-2022-38751.57.30.00122022-12-19
CVE-2024-221791.57.50.00082024-04-18
CVE-2024-37411.57.50.00032024-04-18
CVE-2024-40241.57.30.01032024-04-25
CVE-2024-453701.57.30.00022025-12-01
CVE-2022-25031.46.90.00012022-08-12
CVE-2024-470861.36.50.00132024-09-19
CVE-2024-84751.36.50.00062024-12-17
CVE-2026-285101.25.90.00042026-05-05