CWE-268: Privilege Chaining
low-riskTwo distinct privileges, roles, capabilities, or rights can be combined in a way that allows an entity to perform unsafe actions that would not be allowed without that combination.
Abstraction: Base
Common Consequences
Access Control
→
Gain Privileges or Assume Identity
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2025-49741 | 7.4 | 5.1% | — |
| CVE-2024-4877 | 8.8 | 0.2% | — |
| CVE-2019-3844 | 7.8 | 0.2% | — |
| CVE-2022-1003 | 3.3 | 0.1% | — |
| CVE-2023-0759 | 8.8 | 0.1% | — |
| CVE-2025-32955 | 6.0 | 0.1% | — |
| CVE-2024-47045 | 7.8 | 0.1% | — |
| CVE-2025-20112 | 5.1 | 0.1% | — |
| CVE-2023-20194 | 4.9 | 0.1% | — |
| CVE-2025-0889 | 7.8 | 0.0% | — |
1
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
1/50 · Minimal