The following captures some simple and complex CVEs and their appropriate CWE mapping(s) based on the information provided in CVE and/or references.
Looking at the advisory, it also says "This lack of [authorization] can be easily exploited because an incremental numeric identifier... It’s easy to enumerate all potential existing identifiers." So, this sounds similar to Insecure Direct Object Reference (IDOR). Keyword search yields CWE-639 - Authorization Bypass Through User-Controlled Key" where in this CVE, the key is used to identify files. But why is it easy to "enumerate" these keys? Because of an "incremental numeric identifier" - that is, we can predict identifiers. A keyword search for "predictable" gets us to CWE-340.
Result - we have a combination of missing authorization and the use of predictable identifiers, so this CVE can be mapped to both CWE-340 and CWE-862.
Notice how our potential CWE mappings changed each step of the way, as we brought in more details from other references, and that we already had to know what "IDOR" was - and to infer that "incremental IDs" implied predictability.
Use of the Common Weakness Enumeration (CWE™) and the associated references from this website are subject to the Terms of Use. CWE is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) and managed by the Homeland Security Systems Engineering and Development Institute (HSSEDI) which is operated by The MITRE Corporation (MITRE). Copyright © 2006–2025, The MITRE Corporation. CWE, CWSS, CWRAF, and the CWE logo are trademarks of The MITRE Corporation.