CWE-284: Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

1,310
Total CVEs
216
Critical
557
High
7.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
124
2025
669
2024
305
2023
121
2022
36

Top Affected Vendors

1 Microsoft 84
2 Apple 79
3 Oracle 57
4 Intel 32
5 Cisco 22
6 Adobe 21
7 Dell 19
8 Fabian 17
9 Mattermost 12
10 Campcodes 11

All Improper Access Control CVEs (1,310)

CVE-2025-1355
7.3

This critical vulnerability in needyamin Library Card System 1.0 allows attackers to upload arbitrary files to the /signup.php endpoint, potentially l...

Feb 16, 2025
CVE-2024-57378
7.3

CVE-2024-57378 is a broken access control vulnerability in Wazuh SIEM 4.8.2 that allows unauthorized creation of internal users without proper role as...

Feb 13, 2025
CVE-2025-24042
7.3

This vulnerability in Visual Studio Code's JS Debug Extension allows attackers to escalate privileges when debugging JavaScript applications. It affec...

Feb 11, 2025
CVE-2025-1165
7.3

This critical vulnerability in Lumsoft ERP 8 allows remote attackers to upload arbitrary files without restrictions via the DoUpload/DoWebUpload funct...

Feb 11, 2025
CVE-2025-21405
7.3

This CVE describes an elevation of privilege vulnerability in Visual Studio that allows authenticated attackers to gain higher privileges than intende...

Jan 14, 2025
CVE-2025-0460
7.3

This critical vulnerability in Blog Botz for Journal Theme 1.0 on OpenCart allows remote attackers to upload arbitrary files without restrictions via ...

Jan 14, 2025
CVE-2024-12233
7.3

CVE-2024-12233 is a critical unrestricted file upload vulnerability in code-projects Online Notice Board that allows attackers to upload malicious fil...

Dec 5, 2024
CVE-2023-51644
7.3

This vulnerability allows unauthenticated remote attackers to execute arbitrary code on Allegra installations due to improper access control in Struts...

Nov 22, 2024
CVE-2024-8269
7.3

The MStore API WordPress plugin allows unauthenticated attackers to create user accounts even when user registration is disabled. This affects all Wor...

Sep 13, 2024
CVE-2023-31341
7.3

This vulnerability in AMD ΞΌProf allows authenticated attackers to trigger an out-of-bounds write through insufficient IOCTL input validation, potenti...

Aug 13, 2024
CVE-2024-38202
7.3

This Windows Update vulnerability allows attackers with basic user privileges to elevate privileges by tricking administrators into performing system ...

Aug 8, 2024
CVE-2024-21110
7.3

This vulnerability in Oracle VM VirtualBox allows a low-privileged local attacker to gain complete control over the virtualization software when a use...

Apr 16, 2024
CVE-2024-26203
7.3

CVE-2024-26203 is an elevation of privilege vulnerability in Azure Data Studio that allows authenticated users to gain higher privileges than intended...

Mar 12, 2024
CVE-2023-32544
7.3

This vulnerability in Intel HotKey Services for Windows 10 on Intel NUC P14E Laptop Element allows authenticated local users to potentially cause deni...

Jan 19, 2024
CVE-2024-0712
7.3

This critical vulnerability in the Byzoro Smart S150 Management Platform allows attackers to bypass access controls via the /useratte/inc/userattea.ph...

Jan 19, 2024
CVE-2023-44290
7.3

Dell Command | Monitor versions before 10.10.0 contain an improper access control vulnerability that allows a local standard user to escalate privileg...

Nov 23, 2023
CVE-2023-43086
7.3

Dell Command | Configure versions before 4.11.0 have an improper access control vulnerability that allows local malicious users to modify files during...

Nov 23, 2023
CVE-2023-5299
7.3

A standard user account in Fuji Electric Tellus Lite can overwrite system files due to improper access control. This affects organizations using vulne...

Nov 22, 2023
CVE-2023-39259
7.3

This vulnerability in Dell OS Recovery Tool allows local authenticated non-administrator users to bypass access controls and gain elevated privileges ...

Nov 16, 2023
CVE-2022-41689
7.3

This vulnerability in Intel In-Band Manageability software allows authenticated local users to escalate privileges due to improper access control. It ...

Nov 14, 2023
CVE-2023-43079
7.3

This vulnerability in Dell OpenManage Server Administrator allows local low-privileged users to execute arbitrary code and elevate privileges due to i...

Oct 13, 2023
CVE-2023-32458
7.3

This vulnerability in Dell AppSync's Embedded Service Enabler component allows a local malicious user to escalate privileges during installation. It a...

Sep 27, 2023
CVE-2023-3039
7.3

CVE-2023-3039 is an improper access control vulnerability in SD ROM Utility that allows low-privileged users to execute arbitrary code with limited ac...

Sep 12, 2023
CVE-2023-25757
7.3

This vulnerability in Intel Unison software allows a privileged user to potentially escalate privileges through network access. It affects systems run...

Aug 11, 2023
CVE-2022-45112
7.3

This vulnerability in Intel VROC software allows authenticated users with local access to potentially escalate privileges due to improper access contr...

Aug 11, 2023
CVE-2023-1862
7.3

The Cloudflare WARP client for Windows had an insecure IPC Named Pipe that allowed unauthorized remote access. This enabled attackers to trigger WARP ...

Jun 20, 2023
CVE-2023-3306
7.3

This critical vulnerability in Ruijie RG-EW1200G wireless access points allows remote attackers to bypass authentication and gain administrative acces...

Jun 18, 2023
CVE-2023-28066
7.3

This vulnerability in Dell OS Recovery Tool allows local authenticated non-administrator users to elevate their privileges on the system. It affects v...

Jun 1, 2023
CVE-2023-1432
7.3

This vulnerability allows attackers to bypass access controls in the Online Food Ordering System 2.0 by manipulating the /fos/admin/ajax.php?action=sa...

Mar 16, 2023
CVE-2023-0963
7.3

This vulnerability in SourceCodester Music Gallery Site 1.0 allows attackers to bypass access controls via the Users.php file's POST request handler. ...

Feb 22, 2023
CVE-2021-23233
7.3

This vulnerability allows unauthenticated attackers to access sensitive endpoints in Fresenius Kabi Agilia Link+ medical infusion systems without any ...

Jan 21, 2022
CVE-2020-10627
7.3

This vulnerability in Insulet Omnipod Insulin Management System insulin pumps allows attackers to intercept or modify wireless RF communications due t...

Dec 1, 2021
CVE-2020-2506
7.3

CVE-2020-2506 is an improper access control vulnerability in QNAP QTS Helpdesk that allows attackers to bypass security controls. If exploited, attack...

Feb 3, 2021
CVE-2026-27624
7.2

This vulnerability allows attackers to bypass Coturn's IP address restrictions by using IPv4-mapped IPv6 addresses. Attackers can send CreatePermissio...

Feb 25, 2026
CVE-2025-62290
7.2

A critical vulnerability in Oracle ZFS Storage Appliance Kit's Block Storage component allows authenticated high-privilege attackers with network acce...

Oct 21, 2025
CVE-2025-30690
7.2

This vulnerability in Oracle Solaris 11's filesystem component allows a high-privileged attacker with local access to potentially take over the system...

Apr 15, 2025
CVE-2024-29054
7.2

This vulnerability in Microsoft Defender for IoT allows authenticated attackers to elevate privileges within the system. Attackers could gain higher-l...

Apr 9, 2024
CVE-2024-0795
7.2

This vulnerability allows attackers with admin or manager roles in Anything LLM to create new admin users without proper backend authentication, enabl...

Mar 2, 2024
CVE-2024-24386
7.2

This vulnerability in VitalPBX allows attackers to execute arbitrary code by uploading crafted payloads to the /var/lib/vitalpbx/scripts folder. It af...

Feb 15, 2024
CVE-2023-40060
7.2

This vulnerability allows administrators with existing access to bypass multi-factor authentication in Serv-U FTP server software. Attackers who alrea...

Sep 7, 2023
CVE-2023-35179
7.2

This vulnerability allows attackers with administrator access to Serv-U to bypass multi-factor authentication (MFA/2FA). It affects Serv-U 15.4 instal...

Aug 11, 2023
CVE-2022-42465
7.2

This vulnerability allows a privileged user on a local system to exploit improper access control in Intel's OFU kernel mode driver, potentially enabli...

May 10, 2023
CVE-2022-21706
7.2

This vulnerability in Zulip Server allows multi-use invitations created in one organization to be used to join any other organization on the same depl...

Feb 26, 2022
CVE-2020-7545
7.2

This vulnerability allows authorized users to execute arbitrary code on the server by accessing a specific webpage in Schneider Electric's EcoStruxure...

Dec 1, 2020
CVE-2020-25654
7.2

This CVE describes an access control list (ACL) bypass vulnerability in Pacemaker cluster resource manager. Attackers with local accounts in the hacli...

Nov 24, 2020
CVE-2026-29077
7.1

This vulnerability in Frappe framework allows authenticated users to share documents with permissions they don't possess, potentially granting unautho...

Mar 5, 2026
CVE-2026-20628
7.1

This CVE describes a sandbox escape vulnerability in multiple Apple operating systems where an app can bypass its security restrictions. It affects us...

Feb 11, 2026
CVE-2025-69220
7.1

This vulnerability allows authenticated attackers to modify the behavior of arbitrary LibreChat agents by uploading files to file contexts or file sea...

Jan 7, 2026
CVE-2026-21447
7.1

An Insecure Direct Object Reference vulnerability in Bagisto eCommerce platform allows authenticated customers to add items from other customers' orde...

Jan 2, 2026
CVE-2025-66736
7.1

CVE-2025-66736 is an authorization bypass vulnerability in youlai-boot V2.21.1 where the importUsers function lacks proper permission checks. This all...

Dec 22, 2025

About Improper Access Control (CWE-284)

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Our database tracks 1,310 CVEs classified as CWE-284, with 216 rated critical and 557 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.

External reference: View CWE-284 on MITRE CWE →

Monitor Improper Access Control Vulnerabilities

Get alerted when new Improper Access Control CVEs affect your infrastructure.

Start Monitoring Free