CWE-283: Unverified Ownership
low-riskThe product does not properly verify that a critical resource is owned by the proper entity.
Abstraction: Base
Common Consequences
Access Control
→
Gain Privileges or Assume Identity
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2020-8554 | 6.3 | 24.8% | — |
| CVE-2024-27903 | 9.8 | 7.0% | — |
| CVE-2023-30544 | 3.9 | 0.5% | — |
| CVE-2025-1007 | 5.3 | 0.4% | — |
| CVE-2025-47940 | 7.2 | 0.3% | — |
| CVE-2021-24501 | 8.1 | 0.3% | — |
| CVE-2021-24500 | 8.1 | 0.2% | — |
| CVE-2023-6068 | 3.1 | 0.1% | — |
| CVE-2022-29220 | 6.5 | 0.1% | — |
| CVE-2026-26016 | 8.1 | 0.1% | — |
2
/ 100
low-risk
Active Threat
2/50 · Minimal
Exploit Availability
0/50 · Minimal