CWE-303: Incorrect Implementation of Authentication Algorithm
low-riskThe requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.
Abstraction: Base
Common Consequences
Access Control
→
Bypass Protection Mechanism
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2024-7593 | 9.8 | 94.4% | Y |
| CVE-2023-29357 | 9.8 | 94.4% | Y |
| CVE-2025-57808 | 8.1 | 6.2% | — |
| CVE-2024-26248 | 7.5 | 4.3% | — |
| CVE-2020-15632 | 8.8 | 4.2% | — |
| CVE-2016-9463 | 8.1 | 3.9% | — |
| CVE-2018-4841 | 9.8 | 3.5% | — |
| CVE-2020-8861 | 8.8 | 3.3% | — |
| CVE-2025-21311 | 9.8 | 3.3% | — |
| CVE-2022-20695 | 10.0 | 2.7% | — |
3
/ 100
low-risk
Active Threat
2/50 · Minimal
Exploit Availability
1/50 · Minimal