CWE-284: Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Yearly Trend
Top Affected Vendors
All Improper Access Control CVEs (1,311)
The Jenkins Stack Hammer Plugin 1.0.6 and earlier stores API keys unencrypted in job configuration files, allowing users with Extended Read permission...
Apr 2, 2025This vulnerability allows an application to modify protected parts of the macOS file system, potentially bypassing security restrictions. It affects m...
Mar 31, 2025A macOS vulnerability involving improper symlink validation allows applications to access sensitive user data they shouldn't have permission to read. ...
Mar 31, 2025This vulnerability allows a malicious app to dismiss the system notification that appears on the Lock Screen when recording starts, potentially hiding...
Mar 31, 2025This CVE describes a privacy vulnerability in Apple operating systems where apps could access sensitive user data from text fields that should have be...
Mar 31, 2025A privacy vulnerability in macOS allowed applications to access user contact information without proper authorization. This affected macOS systems bef...
Mar 31, 2025This CVE describes a logging vulnerability in Apple operating systems where insufficient data redaction allowed apps to access sensitive user informat...
Mar 31, 2025This CVE describes a macOS vulnerability where applications could bypass security checks and access sensitive user data. It affects macOS systems befo...
Mar 17, 2025This vulnerability allows attackers to bypass Windows Virtualization-Based Security (VBS) protections, potentially enabling them to execute code or ac...
Jan 14, 2025This vulnerability in Cisco IOS XR Software allows authenticated local attackers with valid credentials to read any file on the underlying Linux file ...
Sep 11, 2024This vulnerability in IrfanView allows attackers to cause an access violation via a specially crafted EXR image file, leading to application crashes a...
Aug 28, 2024This vulnerability in Mattermost allows a malicious remote attacker to create, update, or delete arbitrary posts in arbitrary channels when shared cha...
Aug 1, 2024This vulnerability allows an app to disclose kernel memory due to improper memory handling in Apple operating systems. It affects iOS, iPadOS, and mac...
May 14, 2024This CVE describes an authorization bypass vulnerability in Pimcore Web2Print Tools Bundle. Authenticated backend users without proper permissions can...
Jan 15, 2026This vulnerability allows unauthorized access to functionality in TheGem WordPress theme plugins for Elementor and WPBakery page builders. Attackers c...
Dec 30, 2025An incorrect access control vulnerability in usememos memos v0.25.2 allows authenticated users with low-level privileges to modify or delete attachmen...
Dec 8, 2025This vulnerability in Nextcloud Deck allows users with 'Can share' permission to modify permissions of other recipients, potentially escalating privil...
Dec 5, 2025This vulnerability allows non-member users to create folders and upload/download files as ZIP archives in public spaces due to insufficient authorizat...
Nov 26, 2025This vulnerability allows attackers with valid read-only accounts to bypass access controls in Doris MCP Server, enabling unauthorized modifications t...
Nov 5, 2025This vulnerability allows low-privileged Splunk users without admin or power roles to create or overwrite system source type configurations via a craf...
Jul 7, 2025This vulnerability in Oracle Database's XML Database component allows authenticated attackers with network access via HTTP to perform unauthorized dat...
Apr 15, 2025The Multiple Page Generator (MPG) WordPress plugin up to version 4.0.1 lacks proper authorization checks on several administrative functions. This all...
Nov 1, 2024This vulnerability allows attackers to bypass authorization controls in Mattermost when archived channel viewing is disabled. Attackers can retrieve p...
Sep 26, 2024This vulnerability in Overleaf Server Pro allows users to access the sharelatex container's filesystem, network, and environment variables during LaTe...
Sep 2, 2024This critical vulnerability in the Insurance Management System allows attackers to bypass access controls by manipulating the 'recipt_no' parameter in...
Aug 27, 2024Kashipara Bus Ticket Reservation System v1.0 has an incorrect access control vulnerability in the /deleteTicket.php endpoint that allows unauthorized ...
Aug 23, 2024This vulnerability in Oracle Purchasing allows authenticated attackers with low privileges to perform unauthorized data manipulation and read access v...
Jul 16, 2024Dell Secure Connect Gateway (SCG) versions before 5.24.00.00 have an improper access control vulnerability in an internal REST API. A remote low-privi...
Jun 13, 2024Dell Secure Connect Gateway (SCG) versions before 5.24.00.00 have an improper access control vulnerability in an internal maintenance REST API. If an ...
Jun 13, 2024This broken access control vulnerability in WeKnora allows any authenticated tenant to read sensitive data from other tenants, including API keys, mod...
Mar 7, 2026This vulnerability allows unauthenticated attackers to delete arbitrary user accounts that were recently created on WordPress sites using the affected...
Feb 26, 2026TrustTunnel VPN protocol versions before 0.9.115 have a rule bypass vulnerability where fragmented or partial TLS ClientHello messages cause client ra...
Jan 29, 2026This vulnerability allows unauthenticated attackers to bind their Slack workspace to any Langfuse project via the Slack OAuth endpoint. This could ena...
Jan 22, 2026This vulnerability in Horilla HRMS allows unauthenticated attackers to view unpublished job postings through an exposed API endpoint. Organizations us...
Jan 22, 2026An improper access control vulnerability in EV Station Lite (v1.5.2 and earlier) allows attackers within Wi-Fi range to use the WiFi AutoLink feature ...
Jan 5, 2026This vulnerability allows authenticated users of DriveLock to retrieve the computer count of other tenants via the API, potentially exposing organizat...
Dec 17, 2025This vulnerability allows admin users in Keyfactor SignServer to enumerate local files by setting the VISIBLE_SIGNATURE_CUSTOM_IMAGE_PATH property to ...
Nov 13, 2025This vulnerability allows administrators in Keyfactor SignServer to write arbitrary files to any directory accessible by the JBoss user. Attackers wit...
Nov 13, 2025This CVE describes an improper access control vulnerability in macOS where applications could bypass entitlement checks to access sensitive user data....
Sep 15, 2025This vulnerability allows unauthenticated remote attackers to bypass management interface ACLs on affected Cisco IOS XR devices, potentially gaining u...
Sep 10, 2025This CVE-2025-36909 vulnerability allows unauthorized access to sensitive information in affected Android Pixel devices. It's an information disclosur...
Sep 4, 2025An authentication bypass vulnerability in Cisco desk and IP phones allows unauthenticated remote attackers to write arbitrary files to specific direct...
Sep 3, 2025This vulnerability allows authenticated attackers with low-level privileges in D-Link DSL-7740C routers to change high-privileged account passwords an...
Aug 25, 2025An Insecure Direct Object Reference (IDOR) vulnerability in Reolink Smart 2K+ Plug-in Wi-Fi Video Doorbell with Chime allows unauthorized attackers to...
Aug 22, 2025This vulnerability in jshERP v3.5 allows unauthorized attackers to access sensitive handler information through the getAllList method in PersonControl...
Aug 21, 2025This vulnerability in jshERP v3.5 allows attackers to bypass access controls in the UserController component, enabling unauthorized password resets fo...
Aug 21, 2025This vulnerability allows unauthorized attackers to modify supplier status information in jshERP v3.5 without proper authentication. It affects all us...
Aug 21, 2025This CVE describes an access control vulnerability in Appian Enterprise BPM version 25.3 that could allow unauthorized users to access sensitive infor...
Aug 19, 2025EzGED3 3.5.0 has an unauthenticated arbitrary file read vulnerability that allows remote attackers to read any file on the server via directory traver...
Aug 19, 2025This vulnerability allows remote attackers to cause denial of service through database resource exhaustion in the jonkastonka Cookies and Content Secu...
Aug 19, 2025About Improper Access Control (CWE-284)
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Our database tracks 1,311 CVEs classified as CWE-284, with 216 rated critical and 558 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.
External reference: View CWE-284 on MITRE CWE →
Monitor Improper Access Control Vulnerabilities
Get alerted when new Improper Access Control CVEs affect your infrastructure.
Start Monitoring Free