CWE-284: Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

1,303
Total CVEs
214
Critical
553
High
7.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
123
2025
669
2024
305
2023
121
2022
36

Top Affected Vendors

1 Microsoft 84
2 Apple 79
3 Oracle 57
4 Intel 32
5 Cisco 21
6 Adobe 20
7 Dell 19
8 Fabian 17
9 Mattermost 12
10 Campcodes 11

All Improper Access Control CVEs (1,303)

CVE-2023-21985
7.7

This vulnerability in Oracle Solaris allows a high-privileged attacker with local access to compromise the system through a utility component. It requ...

Apr 18, 2023
CVE-2022-27838
7.7

This vulnerability allows attackers to bypass access controls in Samsung's FactoryCamera app, enabling unauthorized access to files with system-level ...

Apr 11, 2022
CVE-2025-24857
7.6

This vulnerability allows attackers to bypass access controls in U-Boot bootloader's volatile memory, potentially executing arbitrary code during syst...

Dec 10, 2025
CVE-2025-43862
7.6

CVE-2025-43862 is an access control vulnerability in Dify that allows normal users to access and modify APP orchestration features that should be rest...

Apr 25, 2025
CVE-2024-21195
7.6

This vulnerability in Oracle BI Publisher allows authenticated attackers with low privileges to access, modify, or delete sensitive data, and cause pa...

Oct 15, 2024
CVE-2024-46607
7.6

This vulnerability allows attackers to bypass authentication in IceCMS by entering any arbitrary values as username and password in the admin login en...

Sep 25, 2024
CVE-2024-36443
7.6

Swissphone DiCal-RED 4009 devices have an anonymous FTP service that allows remote attackers to read almost the entire file system without authenticat...

Aug 22, 2024
CVE-2022-34453
7.6

Dell XtremIO X2 XMS versions before 6-4-1.11 have an improper access control vulnerability where remote read-only users can perform add/delete QoS pol...

Aug 3, 2023
CVE-2023-35927
7.6

This vulnerability allows a malicious Nextcloud server to modify or delete VCards in the system addressbook on a trusted partner server. It affects Ne...

Jun 23, 2023
CVE-2024-55019
7.5

This vulnerability allows unauthenticated attackers to download arbitrary files from Weintek cMT-3072XH2 HMI devices via the download_wb.cgi component...

Mar 3, 2026
CVE-2026-25231
7.5

FileRise versions before 3.3.0 have an unauthenticated file read vulnerability where anyone can access files in the /uploads directory without authent...

Feb 9, 2026
CVE-2026-25758
7.5

A critical IDOR vulnerability in Spree Commerce allows guest users to manipulate address ID parameters during checkout, bypassing ownership validation...

Feb 6, 2026
CVE-2025-70986
7.5

This vulnerability in RuoYi v4.8.2 allows unauthorized attackers to bypass access controls in the selectDept function, enabling them to access sensiti...

Jan 23, 2026
CVE-2025-69908
7.5

An unauthenticated information disclosure vulnerability in Newgen OmniApp allows attackers to enumerate valid privileged usernames via a publicly acce...

Jan 23, 2026
CVE-2025-69907
7.5

An unauthenticated information disclosure vulnerability in Newgen OmniDocs allows remote attackers to access the /omnidocs/GetListofCabinet API endpoi...

Jan 23, 2026
CVE-2026-20736
7.5

This vulnerability in Gitea allows users who previously uploaded attachments to a repository to delete those attachments even after losing access to t...

Jan 22, 2026
CVE-2026-21982
7.5

This vulnerability in Oracle VM VirtualBox allows an unauthenticated attacker on the same physical network segment to potentially take complete contro...

Jan 20, 2026
CVE-2026-21984
7.5

This vulnerability in Oracle VM VirtualBox allows a high-privileged attacker with local access to the host system to potentially compromise the virtua...

Jan 20, 2026
CVE-2025-64516
7.5

This vulnerability allows unauthorized users to access documents attached to any item in GLPI (tickets, assets, etc.). If the public FAQ feature is en...

Jan 15, 2026
CVE-2026-22909
7.5

This vulnerability allows unauthorized access to system functions that control installed applications. Attackers can start, stop, or delete applicatio...

Jan 15, 2026
CVE-2026-21889
7.5

CVE-2026-21889 is an improper access control vulnerability in Weblate where screenshot images were served directly by the HTTP server without authenti...

Jan 14, 2026
CVE-2026-20929
7.5

This vulnerability in Windows HTTP.sys allows authenticated attackers to escalate privileges over a network connection. It affects Windows systems run...

Jan 13, 2026
CVE-2026-0386
7.5

This vulnerability allows an unauthorized attacker on an adjacent network to execute arbitrary code on Windows systems running vulnerable Windows Depl...

Jan 13, 2026
CVE-2025-67014
7.5

This vulnerability allows unauthenticated attackers to access administrative endpoints in DEV Systemtechnik GmbH's DEV 7113 RF over Fiber Distribution...

Dec 26, 2025
CVE-2025-67015
7.5

This vulnerability allows attackers to change the Administrator password and escalate privileges on Comtech EF Data CDM-625/CDM-625A satellite modems ...

Dec 26, 2025
CVE-2025-66735
7.5

CVE-2025-66735 is an access control vulnerability in youlai-boot V2.21.1 where the getRoleForm function lacks proper permission checks. This allows no...

Dec 22, 2025
CVE-2025-63663
7.5

This vulnerability allows unauthorized attackers to access other users' uploaded files through the /api/v1/conversations/*/files API in GT Edge AI Pla...

Dec 22, 2025
CVE-2025-63664
7.5

This vulnerability allows unauthorized attackers to access other users' message history with AI agents through an incorrect access control flaw in the...

Dec 22, 2025
CVE-2025-63387
EPSS 15.5% 7.5

CVE-2025-63387 is an insecure permissions vulnerability in Dify v1.9.1 that allows unauthenticated attackers to access the /console/api/system-feature...

Dec 18, 2025
CVE-2025-65176
7.5

Dynatrace OneAgent versions before 1.325.47 automatically retry failed network share access attempts using all available user tokens, enabling NTLM re...

Dec 15, 2025
CVE-2025-65779
7.5

CVE-2025-65779 is an improper access control vulnerability in Wekan that allows unauthenticated attackers to modify the sort order of boards. This aff...

Dec 15, 2025
CVE-2025-65795
7.5

This vulnerability allows unauthenticated attackers to create arbitrary user accounts in usememos memos v0.25.2 by exploiting incorrect access control...

Dec 8, 2025
CVE-2025-63363
7.5

This vulnerability allows attackers to execute de-authentication attacks against Waveshare RS232/485 TO WIFI ETH (B) Serial to Ethernet/Wi-Fi Gateway ...

Dec 4, 2025
CVE-2025-57210
7.5

This vulnerability allows attackers to bypass access controls in the ApiPayController component of platform v1.0.0, potentially exposing sensitive inf...

Dec 4, 2025
CVE-2025-57212
7.5

This vulnerability in the ApiOrderService.java component of platform v1.0.0 allows attackers to bypass access controls and retrieve sensitive informat...

Dec 4, 2025
CVE-2025-57213
7.5

This vulnerability allows attackers to bypass access controls in the orderService.queryObject component of platform v1.0.0, enabling unauthorized acce...

Dec 4, 2025
CVE-2025-55749
7.5

This vulnerability in XWiki Jetty package (XJetty) exposes a context that allows static access to any file in the webapp/ folder. Attackers can potent...

Dec 1, 2025
CVE-2025-55471
7.5

An incorrect access control vulnerability in youlai-boot v2.21.1 allows attackers to bypass authorization checks in the getUserFormData function, enab...

Nov 26, 2025
CVE-2025-54563
7.5

An incorrect access control vulnerability in Desktop Alert PingAlert Application Server versions 6.1.0.11 to 6.1.1.2 allows unauthorized remote attack...

Nov 24, 2025
CVE-2025-54338
7.5

An incorrect access control vulnerability in Desktop Alert PingAlert Application Server versions 6.1.0.11 to 6.1.1.2 allows attackers to access and di...

Nov 24, 2025
CVE-2025-41737
7.5

This vulnerability allows unauthenticated remote attackers to read PHP module source code due to webserver misconfiguration. It affects systems runnin...

Nov 18, 2025
CVE-2025-63667
7.5

This vulnerability allows attackers to bypass authentication and access sensitive API endpoints in SIMICAM, KEVIEW, and ASECAM software. Any organizat...

Nov 12, 2025
CVE-2025-64347
7.5

Apollo Router Core versions 1.61.12-rc.0 and below and 2.8.1-rc.0 and below have an access control bypass vulnerability. When schema elements with acc...

Nov 7, 2025
CVE-2025-64110
7.5

A logic bug in Cursor AI code editor versions 1.7.23 and below allows malicious agents to bypass file protection mechanisms. Attackers who achieve pro...

Nov 5, 2025
CVE-2025-43502
7.5

This CVE describes a privacy bypass vulnerability in Apple operating systems where applications can circumvent certain privacy preferences, potentiall...

Nov 4, 2025
CVE-2025-43413
7.5

This vulnerability allows sandboxed applications on Apple operating systems to observe system-wide network connections, potentially exposing sensitive...

Nov 4, 2025
CVE-2025-63423
7.5

The Italy Wireless Mini Router WIRELESS-N 300M stores the administrator password insecurely, allowing unauthorized access to the device's administrati...

Oct 30, 2025
CVE-2025-61114
7.5

This vulnerability allows attackers to bypass authentication in the 2nd Line Android app by brute-forcing user tokens, since the server only validates...

Oct 30, 2025
CVE-2025-61120
7.5

The AG Life Logger Android app exposes credentials in network traffic and uses predictable verification codes, allowing attackers to intercept authent...

Oct 30, 2025
CVE-2025-61113
7.5

The TalkTalk 3.3.6 Android app contains improper access control vulnerabilities in multiple API endpoints. Attackers can modify request parameters to ...

Oct 30, 2025

About Improper Access Control (CWE-284)

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Our database tracks 1,303 CVEs classified as CWE-284, with 214 rated critical and 553 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.

External reference: View CWE-284 on MITRE CWE →

Monitor Improper Access Control Vulnerabilities

Get alerted when new Improper Access Control CVEs affect your infrastructure.

Start Monitoring Free