CWE-284: Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Yearly Trend
Top Affected Vendors
All Improper Access Control CVEs (1,310)
This critical vulnerability in needyamin Library Card System 1.0 allows attackers to upload arbitrary files to the /signup.php endpoint, potentially l...
Feb 16, 2025CVE-2024-57378 is a broken access control vulnerability in Wazuh SIEM 4.8.2 that allows unauthorized creation of internal users without proper role as...
Feb 13, 2025This vulnerability in Visual Studio Code's JS Debug Extension allows attackers to escalate privileges when debugging JavaScript applications. It affec...
Feb 11, 2025This critical vulnerability in Lumsoft ERP 8 allows remote attackers to upload arbitrary files without restrictions via the DoUpload/DoWebUpload funct...
Feb 11, 2025This CVE describes an elevation of privilege vulnerability in Visual Studio that allows authenticated attackers to gain higher privileges than intende...
Jan 14, 2025This critical vulnerability in Blog Botz for Journal Theme 1.0 on OpenCart allows remote attackers to upload arbitrary files without restrictions via ...
Jan 14, 2025CVE-2024-12233 is a critical unrestricted file upload vulnerability in code-projects Online Notice Board that allows attackers to upload malicious fil...
Dec 5, 2024This vulnerability allows unauthenticated remote attackers to execute arbitrary code on Allegra installations due to improper access control in Struts...
Nov 22, 2024The MStore API WordPress plugin allows unauthenticated attackers to create user accounts even when user registration is disabled. This affects all Wor...
Sep 13, 2024This vulnerability in AMD ΞΌProf allows authenticated attackers to trigger an out-of-bounds write through insufficient IOCTL input validation, potenti...
Aug 13, 2024This Windows Update vulnerability allows attackers with basic user privileges to elevate privileges by tricking administrators into performing system ...
Aug 8, 2024This vulnerability in Oracle VM VirtualBox allows a low-privileged local attacker to gain complete control over the virtualization software when a use...
Apr 16, 2024CVE-2024-26203 is an elevation of privilege vulnerability in Azure Data Studio that allows authenticated users to gain higher privileges than intended...
Mar 12, 2024This vulnerability in Intel HotKey Services for Windows 10 on Intel NUC P14E Laptop Element allows authenticated local users to potentially cause deni...
Jan 19, 2024This critical vulnerability in the Byzoro Smart S150 Management Platform allows attackers to bypass access controls via the /useratte/inc/userattea.ph...
Jan 19, 2024Dell Command | Monitor versions before 10.10.0 contain an improper access control vulnerability that allows a local standard user to escalate privileg...
Nov 23, 2023Dell Command | Configure versions before 4.11.0 have an improper access control vulnerability that allows local malicious users to modify files during...
Nov 23, 2023A standard user account in Fuji Electric Tellus Lite can overwrite system files due to improper access control. This affects organizations using vulne...
Nov 22, 2023This vulnerability in Dell OS Recovery Tool allows local authenticated non-administrator users to bypass access controls and gain elevated privileges ...
Nov 16, 2023This vulnerability in Intel In-Band Manageability software allows authenticated local users to escalate privileges due to improper access control. It ...
Nov 14, 2023This vulnerability in Dell OpenManage Server Administrator allows local low-privileged users to execute arbitrary code and elevate privileges due to i...
Oct 13, 2023This vulnerability in Dell AppSync's Embedded Service Enabler component allows a local malicious user to escalate privileges during installation. It a...
Sep 27, 2023CVE-2023-3039 is an improper access control vulnerability in SD ROM Utility that allows low-privileged users to execute arbitrary code with limited ac...
Sep 12, 2023This vulnerability in Intel Unison software allows a privileged user to potentially escalate privileges through network access. It affects systems run...
Aug 11, 2023This vulnerability in Intel VROC software allows authenticated users with local access to potentially escalate privileges due to improper access contr...
Aug 11, 2023The Cloudflare WARP client for Windows had an insecure IPC Named Pipe that allowed unauthorized remote access. This enabled attackers to trigger WARP ...
Jun 20, 2023This critical vulnerability in Ruijie RG-EW1200G wireless access points allows remote attackers to bypass authentication and gain administrative acces...
Jun 18, 2023This vulnerability in Dell OS Recovery Tool allows local authenticated non-administrator users to elevate their privileges on the system. It affects v...
Jun 1, 2023This vulnerability allows attackers to bypass access controls in the Online Food Ordering System 2.0 by manipulating the /fos/admin/ajax.php?action=sa...
Mar 16, 2023This vulnerability in SourceCodester Music Gallery Site 1.0 allows attackers to bypass access controls via the Users.php file's POST request handler. ...
Feb 22, 2023This vulnerability allows unauthenticated attackers to access sensitive endpoints in Fresenius Kabi Agilia Link+ medical infusion systems without any ...
Jan 21, 2022This vulnerability in Insulet Omnipod Insulin Management System insulin pumps allows attackers to intercept or modify wireless RF communications due t...
Dec 1, 2021CVE-2020-2506 is an improper access control vulnerability in QNAP QTS Helpdesk that allows attackers to bypass security controls. If exploited, attack...
Feb 3, 2021This vulnerability allows attackers to bypass Coturn's IP address restrictions by using IPv4-mapped IPv6 addresses. Attackers can send CreatePermissio...
Feb 25, 2026A critical vulnerability in Oracle ZFS Storage Appliance Kit's Block Storage component allows authenticated high-privilege attackers with network acce...
Oct 21, 2025This vulnerability in Oracle Solaris 11's filesystem component allows a high-privileged attacker with local access to potentially take over the system...
Apr 15, 2025This vulnerability in Microsoft Defender for IoT allows authenticated attackers to elevate privileges within the system. Attackers could gain higher-l...
Apr 9, 2024This vulnerability allows attackers with admin or manager roles in Anything LLM to create new admin users without proper backend authentication, enabl...
Mar 2, 2024This vulnerability in VitalPBX allows attackers to execute arbitrary code by uploading crafted payloads to the /var/lib/vitalpbx/scripts folder. It af...
Feb 15, 2024This vulnerability allows administrators with existing access to bypass multi-factor authentication in Serv-U FTP server software. Attackers who alrea...
Sep 7, 2023This vulnerability allows attackers with administrator access to Serv-U to bypass multi-factor authentication (MFA/2FA). It affects Serv-U 15.4 instal...
Aug 11, 2023This vulnerability allows a privileged user on a local system to exploit improper access control in Intel's OFU kernel mode driver, potentially enabli...
May 10, 2023This vulnerability in Zulip Server allows multi-use invitations created in one organization to be used to join any other organization on the same depl...
Feb 26, 2022This vulnerability allows authorized users to execute arbitrary code on the server by accessing a specific webpage in Schneider Electric's EcoStruxure...
Dec 1, 2020This CVE describes an access control list (ACL) bypass vulnerability in Pacemaker cluster resource manager. Attackers with local accounts in the hacli...
Nov 24, 2020This vulnerability in Frappe framework allows authenticated users to share documents with permissions they don't possess, potentially granting unautho...
Mar 5, 2026This CVE describes a sandbox escape vulnerability in multiple Apple operating systems where an app can bypass its security restrictions. It affects us...
Feb 11, 2026This vulnerability allows authenticated attackers to modify the behavior of arbitrary LibreChat agents by uploading files to file contexts or file sea...
Jan 7, 2026An Insecure Direct Object Reference vulnerability in Bagisto eCommerce platform allows authenticated customers to add items from other customers' orde...
Jan 2, 2026CVE-2025-66736 is an authorization bypass vulnerability in youlai-boot V2.21.1 where the importUsers function lacks proper permission checks. This all...
Dec 22, 2025About Improper Access Control (CWE-284)
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Our database tracks 1,310 CVEs classified as CWE-284, with 216 rated critical and 557 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.
External reference: View CWE-284 on MITRE CWE →
Monitor Improper Access Control Vulnerabilities
Get alerted when new Improper Access Control CVEs affect your infrastructure.
Start Monitoring Free