CWE-303: Incorrect Implementation of Authentication Algorithm

low-risk

The requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.

Abstraction: Base

Common Consequences

Access Control Bypass Protection Mechanism

Real-World Examples (10)

CVE CVSS EPSS KEV
CVE-2024-7593 9.8 94.4% Y
CVE-2023-29357 9.8 94.4% Y
CVE-2025-57808 8.1 6.2%
CVE-2024-26248 7.5 4.3%
CVE-2020-15632 8.8 4.2%
CVE-2016-9463 8.1 3.9%
CVE-2018-4841 9.8 3.5%
CVE-2020-8861 8.8 3.3%
CVE-2025-21311 9.8 3.3%
CVE-2022-20695 10.0 2.7%
3
/ 100
low-risk
Active Threat 2/50 · Minimal
Exploit Availability 1/50 · Minimal