CWE-284: Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

1,306
Total CVEs
216
Critical
554
High
7.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
123
2025
669
2024
305
2023
121
2022
36

Top Affected Vendors

1 Microsoft 84
2 Apple 79
3 Oracle 57
4 Intel 32
5 Cisco 21
6 Adobe 21
7 Dell 19
8 Fabian 17
9 Mattermost 12
10 Campcodes 11

All Improper Access Control CVEs (1,306)

CVE-2025-61114
7.5

This vulnerability allows attackers to bypass authentication in the 2nd Line Android app by brute-forcing user tokens, since the server only validates...

Oct 30, 2025
CVE-2025-61120
7.5

The AG Life Logger Android app exposes credentials in network traffic and uses predictable verification codes, allowing attackers to intercept authent...

Oct 30, 2025
CVE-2025-61113
7.5

The TalkTalk 3.3.6 Android app contains improper access control vulnerabilities in multiple API endpoints. Attackers can modify request parameters to ...

Oct 30, 2025
CVE-2025-61116
7.5

This vulnerability allows attackers to bypass authentication in the AdForest Android app by manipulating Base64-encoded email credentials. Attackers c...

Oct 30, 2025
CVE-2025-61118
7.5

The mCarFix Motorists App version 2.3 contains improper access control vulnerabilities that allow attackers to bypass verification and register fake a...

Oct 30, 2025
CVE-2025-61234
7.5

This vulnerability allows unauthenticated attackers on the local network to interact with Dataphone A920 devices via port 8888 without credentials. Th...

Oct 29, 2025
CVE-2025-61760
7.5

This vulnerability in Oracle VM VirtualBox allows a low-privileged attacker with local access to the host system to potentially take over VirtualBox t...

Oct 21, 2025
CVE-2025-58726
7.5

An improper access control vulnerability in Windows SMB Server allows authenticated attackers to elevate privileges over the network. This affects Win...

Oct 14, 2025
CVE-2025-48707
7.5

A vulnerability in Stormshield Network Security (SNS) firewalls allows TPM authentication information to be shared among administrators in certain hig...

Sep 25, 2025
CVE-2025-37125
7.5

A broken access control vulnerability in HPE Aruba EdgeConnect OS allows attackers to bypass firewall protections, potentially enabling unauthorized n...

Sep 16, 2025
CVE-2025-24088
7.5

This vulnerability allows malicious applications to bypass Mobile Device Management (MDM) profile restrictions on macOS systems. It affects organizati...

Sep 15, 2025
CVE-2025-55238
7.5

This vulnerability in Dynamics 365 FastTrack Implementation Assets allows unauthorized access to sensitive information. It affects organizations using...

Sep 4, 2025
CVE-2025-54599
7.5

This CVE describes an account takeover vulnerability in the Bevy Event service when SSO is used. Attackers can hijack victim accounts by exploiting SS...

Sep 2, 2025
CVE-2024-57152
7.5

This vulnerability allows attackers to bypass authentication in my-site v1.0.2 by exploiting incorrect access control in the BaseInterceptor class. At...

Aug 20, 2025
CVE-2024-53495
7.5

This vulnerability allows attackers to bypass authentication in my-site v1.0.2.RELEASE by exploiting incorrect access control in the preHandle functio...

Aug 20, 2025
CVE-2025-51532
7.5

This vulnerability allows unauthenticated attackers to access the Database Monitor administrative interface in Sage DPW software through specially cra...

Aug 6, 2025
CVE-2025-31698
7.5

Apache Traffic Server versions 9.0.0-9.2.10 and 10.0.0-10.0.6 have an ACL bypass vulnerability when using PROXY protocol. The access control lists in ...

Jun 19, 2025
CVE-2025-33056
7.5

This vulnerability in Microsoft's Local Security Authority Server allows unauthorized attackers to cause denial of service over a network. It affects ...

Jun 10, 2025
CVE-2025-20100
7.5

This vulnerability allows a privileged user on affected Intel Xeon 6 processors with E-cores to potentially escalate privileges through improper memor...

May 13, 2025
CVE-2025-29448
7.5

An unauthenticated booking logic flaw in Easy!Appointments v1.5.1 allows attackers to create appointments with excessively long durations, blocking al...

May 7, 2025
CVE-2025-45610
7.5

This vulnerability allows attackers to bypass access controls in PassJava-Platform's schedule log component, enabling unauthorized access to sensitive...

May 5, 2025
CVE-2025-45613
7.5

This vulnerability in Shiro-Action v0.6 allows attackers to bypass access controls on the /user/list endpoint, potentially exposing sensitive user inf...

May 5, 2025
CVE-2025-45617
7.5

This vulnerability allows attackers to bypass access controls in the /user/list endpoint of production_ssm v0.0.1-SNAPSHOT, enabling unauthorized acce...

May 5, 2025
CVE-2025-45608
7.5

This vulnerability allows attackers to bypass access controls in Xinguan v0.0.1-SNAPSHOT's /system/user/findUserList API, enabling unauthorized access...

May 5, 2025
CVE-2025-45237
7.5

This vulnerability allows attackers to bypass access controls and download a JSON configuration file containing sensitive account information from DBS...

May 5, 2025
CVE-2025-32470
7.5

This vulnerability allows remote unauthenticated attackers to change the IP address of affected SICK devices, causing denial of service by making the ...

Apr 28, 2025
CVE-2025-30140
7.5

G-Net Dashcam BB GONX devices use an unregistered public domain name for internal communication, creating a security vulnerability. An attacker could ...

Mar 18, 2025
CVE-2024-36259
7.5

This vulnerability allows authenticated remote attackers to extract sensitive information from Odoo's mail module through an oracle-based attack that ...

Feb 25, 2025
CVE-2024-56889
7.5

This vulnerability allows unauthorized attackers to delete complaints in CodeAstro Complaint Management System v1.0 by manipulating the id parameter i...

Feb 6, 2025
CVE-2024-57433
7.5

This vulnerability in macrozheng mall-tiny 1.0.1 allows attackers to maintain access to user accounts even after logout due to improper token invalida...

Jan 31, 2025
CVE-2025-0744
7.5

An authenticated attacker can change their subscription plan without payment by manipulating POST requests to the payment endpoint. This affects all E...

Jan 30, 2025
CVE-2025-0745
7.5

An Improper Access Control vulnerability in EmbedAI 2.1 and earlier allows authenticated attackers to access database backup files via a specific endp...

Jan 30, 2025
CVE-2024-40749
7.5

This CVE describes an improper access control vulnerability in Joomla core that allows unauthorized users to access protected views. It affects Joomla...

Jan 7, 2025
CVE-2024-38204
7.5

This vulnerability allows an authorized attacker to elevate privileges in Imagine Cup software over a network connection. Attackers with existing acce...

Oct 15, 2024
CVE-2024-45408
7.5

CVE-2024-45408 is an incorrect permission check vulnerability in eLabFTW that allows authenticated users to access restricted information. If anonymou...

Oct 1, 2024
CVE-2024-46610
7.5

An access control vulnerability in IceCMS v3.4.7 and earlier allows attackers to modify any user's information, including usernames and passwords, wit...

Sep 25, 2024
CVE-2023-43626
7.5

This UEFI firmware vulnerability in certain Intel processors allows a privileged user with local access to potentially escalate privileges by bypassin...

Sep 16, 2024
CVE-2024-43477
7.5

This vulnerability allows unauthenticated attackers to disable Verifiable ID's on other tenants in Decentralized Identity Services due to improper acc...

Aug 23, 2024
CVE-2024-42772
7.5

An unauthenticated attacker can access the /admin/rooms.php endpoint in Kashipara Hotel Management System v1.0, allowing them to view hotel room entri...

Aug 22, 2024
CVE-2024-27187
7.5

This vulnerability in Joomla! allows backend users to overwrite their usernames even when this action should be restricted by access controls. This af...

Aug 20, 2024
CVE-2024-6221
7.5

This vulnerability in flask-cors 4.0.1 sets the Access-Control-Allow-Private-Network CORS header to true by default, allowing external websites to mak...

Aug 18, 2024
CVE-2024-41518
7.5

An incorrect access control vulnerability in Feripro allows remote attackers to export sensitive registration and participant data via the /admin/prog...

Aug 2, 2024
CVE-2024-40786
7.5

CVE-2024-40786 is an Apple iOS/iPadOS/macOS vulnerability involving improper state management that allows attackers to view sensitive user information...

Jul 29, 2024
CVE-2024-38061
7.5

This vulnerability allows an authenticated attacker to perform cross-session activation of DCOM objects, potentially gaining elevated privileges. It a...

Jul 9, 2024
CVE-2024-37677
7.5

This vulnerability in Shenzhen Weitillage Industrial Co., Ltd's access management specialist software allows remote attackers to access sensitive info...

Jun 24, 2024
CVE-2024-34112
7.5

This CVE describes an Improper Access Control vulnerability in Adobe ColdFusion that allows unauthenticated attackers to read arbitrary files from the...

Jun 13, 2024
CVE-2024-26029
7.5

CVE-2024-26029 is an improper access control vulnerability in Adobe Experience Manager that allows attackers to bypass security features and potential...

Jun 13, 2024
CVE-2024-23315
7.5

An unauthenticated read-what-where vulnerability in AutomationDirect P3-550E programming software allows attackers to read arbitrary memory locations ...

May 28, 2024
CVE-2024-27790
7.5

This vulnerability in FileMaker Server allows unauthorized access to database records by bypassing transaction validation. It affects organizations us...

May 14, 2024
CVE-2024-29207
7.5

This CVE describes an improper certificate validation vulnerability in UniFi Connect products that allows attackers on the same network to potentially...

May 7, 2024

About Improper Access Control (CWE-284)

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Our database tracks 1,306 CVEs classified as CWE-284, with 216 rated critical and 554 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.

External reference: View CWE-284 on MITRE CWE →

Monitor Improper Access Control Vulnerabilities

Get alerted when new Improper Access Control CVEs affect your infrastructure.

Start Monitoring Free