CWE-284: Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Yearly Trend
Top Affected Vendors
All Improper Access Control CVEs (1,293)
This vulnerability allows unauthenticated attackers to bypass authentication in hope-boot v1.0.0 by sending a specially crafted GET request to the /us...
May 5, 2025This vulnerability allows attackers to bypass access controls in yaoqishan's admin API, enabling unauthorized users to gain administrative privileges....
May 5, 2025This vulnerability allows authenticated users of DataEase to achieve remote code execution through the backend JDBC link functionality. It affects all...
May 1, 2025OpenFGA versions 1.3.6 through 1.8.10 contain an authorization bypass vulnerability in Check and ListObject calls. This allows attackers to bypass per...
Apr 30, 2025This vulnerability allows attackers to bypass authentication mechanisms in Orban OPTIMOD 5950 systems, granting them Administrator privileges without ...
Apr 18, 2025A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain administrative privileges. The cancelAuthUserAll method fails to...
Apr 7, 2025A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privileges through the /editSave method in SysNoticeCon...
Apr 7, 2025A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privileges by manipulating the jobId parameter. This af...
Apr 7, 2025A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privileges through the changeStatus method. This affect...
Apr 7, 2025A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privileges by exploiting improper validation of the dep...
Apr 7, 2025This vulnerability allows malicious shortcuts in Apple's Shortcuts app to bypass file access restrictions and read sensitive files that should be inac...
Mar 31, 2025This macOS vulnerability allows malicious applications to trick users into copying sensitive data to the system clipboard without proper authorization...
Mar 31, 2025CVE-2025-26010 allows unauthenticated attackers to modify administrator passwords on Telesquare TLR-2005KSH routers by exploiting the admin.cgi parame...
Mar 26, 2025This vulnerability allows attackers to bypass Shiro-based RBAC controls in OpenDaylight SFC, enabling unauthorized execution of privileged operations....
Mar 24, 2025This vulnerability allows remote unauthenticated attackers to bypass administrator authentication on FortiMail email security appliances. Attackers ca...
Mar 18, 2025This vulnerability allows attackers to bypass access controls in Vasion Print (formerly PrinterLogic) due to improper PHP configuration. Attackers can...
Mar 5, 2025Unifiedtransform v2.X has an improper access control vulnerability where unauthorized users can access and manipulate the teacher/edit/{id} endpoint i...
Feb 26, 2025The Vayu Blocks WordPress plugin has a critical vulnerability that allows unauthenticated attackers to install and activate arbitrary plugins. This ca...
Dec 12, 2024CVE-2023-26770 is an authentication bypass vulnerability in TaskCafe where unauthenticated attackers can reset any user's password by knowing their Us...
Oct 4, 2024This vulnerability in the Arc browser allows attackers to create or update JavaScript boosts using another user's ID due to misconfigured Firebase ACL...
Sep 20, 2024Loftware Spectrum through version 4.6 has an unprotected JMX Registry, allowing unauthenticated remote attackers to access Java Management Extensions ...
Sep 10, 2024This vulnerability allows attackers to reset passwords for any user account by exploiting insufficient domain validation in the password reset functio...
Sep 2, 2024This vulnerability allows unauthenticated attackers to directly call actions in the OutputController of the powermail TYPO3 extension, bypassing acces...
Aug 29, 2024An incorrect access control vulnerability in Rubrik Cloud Data Management (CDM) allows attackers with network access to bypass authentication and exec...
Aug 27, 2024An improper access control vulnerability in SonicWall SonicOS management interface allows attackers to bypass authentication and access restricted res...
Aug 23, 2024eScan Management Console 14.0.1400.2281 has an incorrect access control vulnerability in the acteScanAVReport component that allows unauthorized acces...
Aug 20, 2024This Broken Access Control vulnerability in Kashipara Online Exam System v1.0 allows unauthenticated remote attackers to directly access administrator...
Aug 12, 2024This vulnerability in Poly Clariti Manager firmware allows attackers to bypass access controls due to improper implementation. Attackers could gain un...
Aug 7, 2024CVE-2024-38909 is an incorrect access control vulnerability in elFinder 2.1.64 that allows attackers to copy files with unauthorized extensions betwee...
Jul 30, 2024This vulnerability allows attackers to bypass authentication and gain administrative privileges on Solar-Log 1000 devices by connecting to the web adm...
Jul 26, 2024Meshery v0.7.51 has insecure permissions that allow attackers to access the service account's token. This enables privilege escalation and access to s...
Jul 24, 2024LibreChat through version 0.7.4-rc1 has an access control vulnerability that allows unauthorized users to modify messages belonging to other users. Th...
Jul 22, 2024CVE-2024-39376 allows unauthorized users to access sensitive information or perform actions beyond their permissions on TELSAT marKoni FM Transmitters...
Jun 27, 2024This vulnerability in GigaDevice GD32E103C8T6 microcontrollers allows unauthorized access to protected memory regions due to incorrect access control....
Jun 25, 2024This vulnerability allows remote attackers to bypass authentication in Axiros AXESS Auto Configuration Server (ACS) and execute arbitrary code without...
Jun 24, 2024CVE-2024-22074 is an incorrect access control vulnerability in Dynamsoft Service that allows unauthorized users to bypass authentication mechanisms. T...
Jun 6, 2024An improper access control vulnerability in Prodys' Quantum Audio codec allows unauthenticated attackers to bypass authentication entirely and execute...
May 23, 2024Westermo EDW-100 serial-to-Ethernet converters have a hidden root account with an unchangeable hardcoded password, allowing attackers to gain full adm...
May 19, 2024This vulnerability allows attackers to bypass access controls on the Shenzhen JF6000 Cloud Media Collaboration Processing Platform. Attackers can pote...
Apr 30, 2024This vulnerability allows unauthenticated remote attackers to execute arbitrary commands on Apache HugeGraph-Server instances. It affects all Apache H...
Apr 22, 2024This critical vulnerability in Xiongmai video surveillance devices allows remote attackers to bypass authentication controls via a crafted input to th...
Apr 14, 2024Siklu TG Terragraph devices have a hardcoded root password that can be discovered via brute force attacks on an MD5 hash. This allows attackers to gai...
Mar 18, 2024This vulnerability in the ultimateimagetool module for PrestaShop allows remote attackers to bypass access controls, potentially gaining administrativ...
Mar 14, 2024SINEMA Remote Connect Server versions before V3.2 have improper access control on web service endpoints, allowing attackers to bypass authentication a...
Mar 12, 2024This vulnerability allows unauthenticated attackers to bypass access controls in Book Store Management System v1, enabling them to access administrati...
Mar 1, 2024CVE-2023-49930 is an improper access control vulnerability in Couchbase Server that allows unauthenticated attackers to execute arbitrary code via cUR...
Feb 29, 2024In RWS WorldServer versions before 11.7.3, regular authenticated users can create new user accounts with Administrator privileges through the UserWSUs...
Feb 29, 2024CVE-2024-25169 allows attackers to bypass access control mechanisms in Mezzanine's admin panel via crafted requests, potentially gaining unauthorized ...
Feb 28, 2024CVE-2024-24300 is an authentication bypass vulnerability in 4ipnet EAP-767 wireless access points where session cookies remain static across multiple ...
Feb 14, 2024This vulnerability in Microsoft Entra Jira Single-Sign-On Plugin allows attackers to elevate privileges, potentially gaining unauthorized access to Ji...
Feb 13, 2024About Improper Access Control (CWE-284)
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Our database tracks 1,293 CVEs classified as CWE-284, with 212 rated critical and 546 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.
External reference: View CWE-284 on MITRE CWE →
Monitor Improper Access Control Vulnerabilities
Get alerted when new Improper Access Control CVEs affect your infrastructure.
Start Monitoring Free