CWE-284: Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

1,310
Total CVEs
216
Critical
557
High
7.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
124
2025
669
2024
305
2023
121
2022
36

Top Affected Vendors

1 Microsoft 84
2 Apple 79
3 Oracle 57
4 Intel 32
5 Cisco 22
6 Adobe 21
7 Dell 19
8 Fabian 17
9 Mattermost 12
10 Campcodes 11

All Improper Access Control CVEs (1,310)

CVE-2026-20883
6.5

This vulnerability allows users with revoked access to private Gitea repositories to still view issue titles and repository names through previously s...

Jan 22, 2026
CVE-2025-66911
6.5

This vulnerability in Turms IM Server allows any authenticated user to query the online status, device information, and login timestamps of arbitrary ...

Dec 19, 2025
CVE-2025-65797
6.5

This vulnerability allows attackers with low-level privileges in usememos memos v0.25.2 to modify or delete identity providers, potentially leading to...

Dec 8, 2025
CVE-2025-65097
6.5

This vulnerability allows authenticated users in RomM (ROM Manager) to delete collections belonging to other users by sending a DELETE request to the ...

Dec 3, 2025
CVE-2025-65238
6.5

This vulnerability allows attackers with low-level privileges in OpenCode Systems USSD Gateway to bypass access controls and dump user records contain...

Nov 26, 2025
CVE-2025-63214
6.5

This vulnerability allows unauthorized attackers to create and delete arbitrary user accounts in bridgetech VBC Server & Element Manager firmware vers...

Nov 19, 2025
CVE-2025-56499
6.5

This vulnerability in mihomo v1.19.11 allows authenticated attackers with low-level privileges to read arbitrary files with elevated privileges by ext...

Nov 18, 2025
CVE-2025-60876
6.5

BusyBox wget versions through 1.3.7 improperly accept raw CR/LF and C0 control characters in HTTP request targets, allowing attackers to split request...

Nov 10, 2025
CVE-2025-63686
6.5

This CVE describes an arbitrary file download vulnerability in GuoMinJim PersonManage software. Attackers can download arbitrary files from the server...

Nov 7, 2025
CVE-2025-12808
6.5

An improper access control vulnerability in Devolutions Server allows users with 'View-only' permissions to access sensitive nested password fields th...

Nov 6, 2025
CVE-2025-54970
6.5

An authentication bypass vulnerability in BAE SOCET GXP Job Status Service allows unauthorized users to abort jobs or access job information without p...

Oct 27, 2025
CVE-2025-50075
6.5

This vulnerability in Oracle Financial Services Revenue Management and Billing allows authenticated attackers with low privileges to access sensitive ...

Oct 21, 2025
CVE-2025-53035
6.5

This vulnerability in Oracle Financial Services Analytical Applications Infrastructure allows authenticated attackers with low privileges to access se...

Oct 21, 2025
CVE-2025-60427
6.5

LibreTime 3.0.0-alpha.10 and earlier versions have a broken access control vulnerability where users with DJ role can access analytics data they shoul...

Oct 21, 2025
CVE-2025-37136
6.5

This vulnerability allows authenticated remote attackers to delete arbitrary files on Aruba AOS-8 Controller/Mobility Conductor systems via the comman...

Oct 14, 2025
CVE-2025-37137
6.5

This vulnerability allows authenticated remote attackers to delete arbitrary files on Aruba AOS-8 Controller/Mobility Conductor systems through the co...

Oct 14, 2025
CVE-2025-20366
6.5

A low-privileged user in Splunk Enterprise or Splunk Cloud Platform can access sensitive search results by guessing the unique Search ID (SID) of admi...

Oct 1, 2025
CVE-2025-55797
6.5

An improper access control vulnerability in FormCms v0.5.4 allows unauthenticated attackers to access historical schema data through the /api/schemas/...

Sep 30, 2025
CVE-2025-44178
6.5

DASAN GPON ONU H660WM routers with firmware version H660WMR210825 have improper access control in default settings, allowing attackers to access sensi...

Aug 25, 2025
CVE-2025-29524
6.5

This vulnerability allows attackers to bypass access controls on DASAN GPON ONU H660WM devices, exposing sensitive system information through the /cgi...

Aug 25, 2025
CVE-2024-46412
6.5

This vulnerability allows attackers to bypass authentication in Rebuild v3.7.7 by sending a specially crafted GET request to the /commons/ip-location ...

Aug 25, 2025
CVE-2025-50861
6.5

The Lotus Cars Android app version 1.2.8 contains an exported component (PushDeepLinkActivity) that can be accessed without authentication via ADB or ...

Aug 14, 2025
CVE-2025-24323
6.5

This vulnerability allows a privileged user with local access to potentially escalate privileges through improper access control in Intel PCIe Switch ...

Aug 12, 2025
CVE-2024-42048
6.5

This vulnerability in OpenOrange Business Framework 1.15.5 allows authenticated users to write to the installation directory, enabling DLL hijacking d...

Aug 7, 2025
CVE-2025-51054
6.5

Vedo Suite 2024.17 has an authentication bypass vulnerability where unauthenticated attackers can obtain high-privilege JWT tokens by sending empty PO...

Aug 6, 2025
CVE-2025-51627
6.5

CVE-2025-51627 is an improper access control vulnerability in CaricaVerbale component of Agenzia Impresa Eccobook v2.81.1 that allows authenticated at...

Aug 5, 2025
CVE-2025-51060
6.5

This vulnerability in CPUID cpuz.sys driver allows attackers to execute arbitrary code with kernel privileges by exploiting unvalidated DeviceIoContro...

Aug 5, 2025
CVE-2025-43980
6.5

FIRSTNUM JC21A-04 devices have SSH enabled by default with hardcoded root/admin credentials that cannot be disabled via the GUI. This allows attackers...

Aug 5, 2025
CVE-2025-52166
6.5

This vulnerability allows authenticated attackers in Agorum core open software to escalate their privileges to Administrator level, gaining unauthoriz...

Jul 18, 2025
CVE-2025-44525
6.5

This vulnerability allows attackers to send specially crafted Bluetooth Low Energy (BLE) LL_Length_Req packets to Texas Instruments CC2652RB devices, ...

Jul 9, 2025
CVE-2025-50405
6.5

The Intelbras RX1500 Router firmware versions up to v2.2.17 have incorrect access control in the FirmwareUpload and GetFirmwareValidation functions. T...

Jul 1, 2025
CVE-2024-57336
6.5

This vulnerability allows unauthorized attackers to bypass access controls in M2Soft CROWNIX Report & ERS software, granting them Administrator accoun...

May 28, 2025
CVE-2025-28371
6.5

This vulnerability allows attackers to change the administrator password on EnGenius ENH500 access points without knowing the current password. Attack...

May 19, 2025
CVE-2025-20190
6.5

This vulnerability in Cisco IOS XE Wireless Controller Software allows authenticated lobby ambassador users to delete arbitrary user accounts, includi...

May 7, 2025
CVE-2025-28367
EPSS 10% 6.5

CVE-2025-28367 is a directory traversal vulnerability in mojoPortal's BetterImageGallery API Controller that allows attackers to read sensitive files ...

Apr 21, 2025
CVE-2025-32795
6.5

This CVE describes an improper access control vulnerability in Dify, an open-source LLM app development platform. Normal users can modify app names, d...

Apr 18, 2025
CVE-2025-30692
6.5

This vulnerability in Oracle iSupplier Portal allows authenticated attackers with low privileges to access sensitive data via HTTP. It affects Oracle ...

Apr 15, 2025
CVE-2025-21197
6.5

This vulnerability allows an authenticated attacker to discover file paths within restricted directories on Windows NTFS systems, even without permiss...

Apr 8, 2025
CVE-2024-55963
EPSS 25.2% 6.5

This vulnerability allows any authenticated user without admin permissions to trigger the restart API in Appsmith, causing a denial of service through...

Mar 26, 2025
CVE-2025-26138
6.5

Systemic Risk Value versions up to 2.8.0 have an improper access control vulnerability in the file download endpoint. Attackers can access unauthorize...

Mar 18, 2025
CVE-2025-2278
6.5

This vulnerability allows authenticated users in Devolutions Server to access temporary access and checkout request information by guessing or knowing...

Mar 13, 2025
CVE-2024-39797
6.5

An improper access control vulnerability in Intel Ethernet Connection I219 Series drivers allows authenticated local users to potentially cause denial...

Feb 12, 2025
CVE-2025-24427
6.5

CVE-2025-24427 is an improper access control vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security measures and gain...

Feb 11, 2025
CVE-2025-23367
6.5

This vulnerability allows users with Monitor or Auditor roles in Wildfly Server to suspend or resume the server despite having only read permissions. ...

Jan 30, 2025
CVE-2025-21185
6.5

This vulnerability in Microsoft Edge allows attackers to gain elevated privileges on affected systems. It affects users running vulnerable versions of...

Jan 17, 2025
CVE-2025-21301
6.5

This vulnerability in Windows Geolocation Service allows unauthorized access to location information without proper permissions. It affects Windows sy...

Jan 14, 2025
CVE-2024-51988
6.5

This vulnerability allows authenticated RabbitMQ users with HTTP API access and some permissions on a virtual host to delete queues they shouldn't hav...

Nov 6, 2024
CVE-2024-47481
6.5

Dell Data Lakehouse versions 1.0.0.0 and 1.1.0 contain an improper access control vulnerability that allows unauthenticated attackers on adjacent netw...

Oct 25, 2024
CVE-2024-43409
6.5

Ghost CMS versions 4.46.0 through 5.89.4 have improper authentication on certain member action endpoints, allowing attackers to perform member-only ac...

Aug 20, 2024
CVE-2024-41251
6.5

An unauthenticated attacker can access teacher registration approval pages in Kashipara Responsive School Management System v3.2.0, allowing them to v...

Aug 7, 2024

About Improper Access Control (CWE-284)

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Our database tracks 1,310 CVEs classified as CWE-284, with 216 rated critical and 557 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.

External reference: View CWE-284 on MITRE CWE →

Monitor Improper Access Control Vulnerabilities

Get alerted when new Improper Access Control CVEs affect your infrastructure.

Start Monitoring Free