CWE-284: Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

1,293
Total CVEs
212
Critical
546
High
7.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
121
2025
669
2024
305
2023
121
2022
36

Top Affected Vendors

1 Microsoft 84
2 Apple 79
3 Oracle 57
4 Intel 32
5 Cisco 21
6 Adobe 20
7 Dell 19
8 Fabian 17
9 Mattermost 12
10 Campcodes 11

All Improper Access Control CVEs (1,293)

CVE-2025-45611
9.8

This vulnerability allows unauthenticated attackers to bypass authentication in hope-boot v1.0.0 by sending a specially crafted GET request to the /us...

May 5, 2025
CVE-2025-45615
9.8

This vulnerability allows attackers to bypass access controls in yaoqishan's admin API, enabling unauthorized users to gain administrative privileges....

May 5, 2025
CVE-2025-46566
9.8

This vulnerability allows authenticated users of DataEase to achieve remote code execution through the backend JDBC link functionality. It affects all...

May 1, 2025
CVE-2025-46331
9.8

OpenFGA versions 1.3.6 through 1.8.10 contain an authorization bypass vulnerability in Check and ListObject calls. This allows attackers to bypass per...

Apr 30, 2025
CVE-2025-28229
9.8

This vulnerability allows attackers to bypass authentication mechanisms in Orban OPTIMOD 5950 systems, granting them Administrator privileges without ...

Apr 18, 2025
CVE-2025-28410
9.8

A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain administrative privileges. The cancelAuthUserAll method fails to...

Apr 7, 2025
CVE-2025-28412
9.8

A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privileges through the /editSave method in SysNoticeCon...

Apr 7, 2025
CVE-2025-28402
9.8

A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privileges by manipulating the jobId parameter. This af...

Apr 7, 2025
CVE-2025-28405
9.8

A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privileges through the changeStatus method. This affect...

Apr 7, 2025
CVE-2025-28408
9.8

A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privileges by exploiting improper validation of the dep...

Apr 7, 2025
CVE-2025-30433
9.8

This vulnerability allows malicious shortcuts in Apple's Shortcuts app to bypass file access restrictions and read sensitive files that should be inac...

Mar 31, 2025
CVE-2025-24241
9.8

This macOS vulnerability allows malicious applications to trick users into copying sensitive data to the system clipboard without proper authorization...

Mar 31, 2025
CVE-2025-26010
9.8

CVE-2025-26010 allows unauthenticated attackers to modify administrator passwords on Telesquare TLR-2005KSH routers by exploiting the admin.cgi parame...

Mar 26, 2025
CVE-2025-29315
9.8

This vulnerability allows attackers to bypass Shiro-based RBAC controls in OpenDaylight SFC, enabling unauthorized execution of privileged operations....

Mar 24, 2025
CVE-2023-47539
9.8

This vulnerability allows remote unauthenticated attackers to bypass administrator authentication on FortiMail email security appliances. Attackers ca...

Mar 18, 2025
CVE-2025-27649
9.8

This vulnerability allows attackers to bypass access controls in Vasion Print (formerly PrinterLogic) due to improper PHP configuration. Attackers can...

Mar 5, 2025
CVE-2024-53573
9.8

Unifiedtransform v2.X has an improper access control vulnerability where unauthorized users can access and manipulate the teacher/edit/{id} endpoint i...

Feb 26, 2025
CVE-2024-10124
9.8

The Vayu Blocks WordPress plugin has a critical vulnerability that allows unauthenticated attackers to install and activate arbitrary plugins. This ca...

Dec 12, 2024
CVE-2023-26770
9.8

CVE-2023-26770 is an authentication bypass vulnerability in TaskCafe where unauthenticated attackers can reset any user's password by knowing their Us...

Oct 4, 2024
CVE-2024-45489
9.8

This vulnerability in the Arc browser allows attackers to create or update JavaScript boosts using another user's ID due to misconfigured Firebase ACL...

Sep 20, 2024
CVE-2023-37234
9.8

Loftware Spectrum through version 4.6 has an unprotected JMX Registry, allowing unauthenticated remote attackers to access Java Management Extensions ...

Sep 10, 2024
CVE-2024-45522
9.8

This vulnerability allows attackers to reset passwords for any user account by exploiting insufficient domain validation in the password reset functio...

Sep 2, 2024
CVE-2024-45233
9.8

This vulnerability allows unauthenticated attackers to directly call actions in the OutputController of the powermail TYPO3 extension, bypassing acces...

Aug 29, 2024
CVE-2024-36068
9.8

An incorrect access control vulnerability in Rubrik Cloud Data Management (CDM) allows attackers with network access to bypass authentication and exec...

Aug 27, 2024
CVE-2024-40766
9.8

An improper access control vulnerability in SonicWall SonicOS management interface allows attackers to bypass authentication and access restricted res...

Aug 23, 2024
CVE-2024-42919
9.8

eScan Management Console 14.0.1400.2281 has an incorrect access control vulnerability in the acteScanAVReport component that allows unauthorized acces...

Aug 20, 2024
CVE-2024-40480
9.8

This Broken Access Control vulnerability in Kashipara Online Exam System v1.0 allows unauthenticated remote attackers to directly access administrator...

Aug 12, 2024
CVE-2024-41912
9.8

This vulnerability in Poly Clariti Manager firmware allows attackers to bypass access controls due to improper implementation. Attackers could gain un...

Aug 7, 2024
CVE-2024-38909
9.8

CVE-2024-38909 is an incorrect access control vulnerability in elFinder 2.1.64 that allows attackers to copy files with unauthorized extensions betwee...

Jul 30, 2024
CVE-2024-40117
9.8

This vulnerability allows attackers to bypass authentication and gain administrative privileges on Solar-Log 1000 devices by connecting to the web adm...

Jul 26, 2024
CVE-2024-36535
9.8

Meshery v0.7.51 has insecure permissions that allow attackers to access the service account's token. This enables privilege escalation and access to s...

Jul 24, 2024
CVE-2024-41703
9.8

LibreChat through version 0.7.4-rc1 has an access control vulnerability that allows unauthorized users to modify messages belonging to other users. Th...

Jul 22, 2024
CVE-2024-39376
9.8

CVE-2024-39376 allows unauthorized users to access sensitive information or perform actions beyond their permissions on TELSAT marKoni FM Transmitters...

Jun 27, 2024
CVE-2024-21741
9.8

This vulnerability in GigaDevice GD32E103C8T6 microcontrollers allows unauthorized access to protected memory regions due to incorrect access control....

Jun 25, 2024
CVE-2024-33898
9.8

This vulnerability allows remote attackers to bypass authentication in Axiros AXESS Auto Configuration Server (ACS) and execute arbitrary code without...

Jun 24, 2024
CVE-2024-22074
9.8

CVE-2024-22074 is an incorrect access control vulnerability in Dynamsoft Service that allows unauthorized users to bypass authentication mechanisms. T...

Jun 6, 2024
CVE-2024-5168
9.8

An improper access control vulnerability in Prodys' Quantum Audio codec allows unauthenticated attackers to bypass authentication entirely and execute...

May 23, 2024
CVE-2024-36080
9.8

Westermo EDW-100 serial-to-Ethernet converters have a hidden root account with an unchangeable hardcoded password, allowing attackers to gain full adm...

May 19, 2024
CVE-2023-49473
9.8

This vulnerability allows attackers to bypass access controls on the Shenzhen JF6000 Cloud Media Collaboration Processing Platform. Attackers can pote...

Apr 30, 2024
CVE-2024-27348
9.8

This vulnerability allows unauthenticated remote attackers to execute arbitrary commands on Apache HugeGraph-Server instances. It affects all Apache H...

Apr 22, 2024
CVE-2024-3765
9.8

This critical vulnerability in Xiongmai video surveillance devices allows remote attackers to bypass authentication controls via a crafted input to th...

Apr 14, 2024
CVE-2022-47036
9.8

Siklu TG Terragraph devices have a hardcoded root password that can be discovered via brute force attacks on an MD5 hash. This allows attackers to gai...

Mar 18, 2024
CVE-2024-28390
9.8

This vulnerability in the ultimateimagetool module for PrestaShop allows remote attackers to bypass access controls, potentially gaining administrativ...

Mar 14, 2024
CVE-2022-32257
9.8

SINEMA Remote Connect Server versions before V3.2 have improper access control on web service endpoints, allowing attackers to bypass authentication a...

Mar 12, 2024
CVE-2023-49543
9.8

This vulnerability allows unauthenticated attackers to bypass access controls in Book Store Management System v1, enabling them to access administrati...

Mar 1, 2024
CVE-2023-49930
9.8

CVE-2023-49930 is an improper access control vulnerability in Couchbase Server that allows unauthenticated attackers to execute arbitrary code via cUR...

Feb 29, 2024
CVE-2022-34270
9.8

In RWS WorldServer versions before 11.7.3, regular authenticated users can create new user accounts with Administrator privileges through the UserWSUs...

Feb 29, 2024
CVE-2024-25169
9.8

CVE-2024-25169 allows attackers to bypass access control mechanisms in Mezzanine's admin panel via crafted requests, potentially gaining unauthorized ...

Feb 28, 2024
CVE-2024-24300
9.8

CVE-2024-24300 is an authentication bypass vulnerability in 4ipnet EAP-767 wireless access points where session cookies remain static across multiple ...

Feb 14, 2024
CVE-2024-21401
9.8

This vulnerability in Microsoft Entra Jira Single-Sign-On Plugin allows attackers to elevate privileges, potentially gaining unauthorized access to Ji...

Feb 13, 2024

About Improper Access Control (CWE-284)

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Our database tracks 1,293 CVEs classified as CWE-284, with 212 rated critical and 546 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.

External reference: View CWE-284 on MITRE CWE →

Monitor Improper Access Control Vulnerabilities

Get alerted when new Improper Access Control CVEs affect your infrastructure.

Start Monitoring Free