CWE-284: Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Yearly Trend
Top Affected Vendors
All Improper Access Control CVEs (1,311)
This vulnerability allows unauthenticated remote attackers to bypass access control rules on Cisco ASA/FTD firewalls by sending traffic to loopback in...
Aug 14, 2025An access control vulnerability in 4C Strategies Exonaut allows unauthorized users to access restricted functionality or data. This affects organizati...
Aug 6, 2025The DocCheck Login WordPress plugin versions up to 1.1.5 contain an authentication bypass vulnerability that allows unauthenticated attackers to read ...
Jul 4, 2025This CVE describes an Improper Access Control vulnerability in Adobe Commerce that allows attackers to bypass security measures and gain limited write...
Jun 10, 2025This vulnerability in Oracle Application Object Library allows unauthenticated attackers with network access via HTTP to read sensitive data from Orac...
Apr 15, 2025This CVE describes an Improper Access Control vulnerability in Adobe Commerce that allows attackers to bypass security measures and gain unauthorized ...
Apr 8, 2025The Enfold WordPress theme has an authorization bypass vulnerability that allows unauthenticated attackers to export all theme settings. This can expo...
Feb 25, 2025The ElementsKit Elementor addons plugin for WordPress has an information disclosure vulnerability that allows unauthenticated attackers to view any co...
Feb 19, 2025The Event Tickets and Registration WordPress plugin has an Insecure Direct Object Reference vulnerability that allows unauthenticated attackers to vie...
Jan 30, 2025The WP Hotel Booking plugin for WordPress has an authorization bypass vulnerability that allows unauthenticated attackers to add rooms with custom pri...
Jan 17, 2025The Tutor LMS WordPress plugin vulnerability allows unauthenticated attackers to register user accounts even when site registration is disabled. This ...
Nov 21, 2024This vulnerability in UEFI firmware for certain Intel server systems allows privileged users to bypass access controls and potentially read sensitive ...
Nov 13, 2024A vulnerability in ICG.AspNetCore.Utilities.CloudStorage library causes incorrect SAS URI duration generation when users specify durations other than ...
Oct 30, 2024This vulnerability in Oracle VM VirtualBox allows a low-privileged attacker with local access to compromise the virtualization software, potentially a...
Oct 15, 2024This vulnerability allows attackers to bypass access controls in the SourceCodester Online Railway Reservation System 1.0 by manipulating the 'id' par...
Sep 29, 2024An incorrect permission assignment vulnerability in Veeam products allows attackers with local access to modify product configuration files. This coul...
Sep 7, 2024This TLS protocol vulnerability allows a malicious TLS 1.2 server to force a TLS 1.3 client with downgrade capability to use an unintended ciphersuite...
Aug 27, 2024An unauthenticated attacker can access student marks data through the /smsa/view_marks.php endpoint in Kashipara Responsive School Management System. ...
Aug 7, 2024An unauthenticated attacker can access teacher details in Kashipara Responsive School Management System v3.2.0 due to improper access controls on the ...
Aug 7, 2024An unauthenticated access control vulnerability in Kashipara Responsive School Management System v3.2.0 allows remote attackers to view the administra...
Aug 7, 2024An unauthenticated attacker can add new subject entries to the Kashipara Responsive School Management System by exploiting incorrect access control in...
Aug 7, 2024This vulnerability in GitLab allows unauthorized users to view merge request titles that were configured to be visible only to project members. It aff...
Jun 27, 2024CVE-2023-22250 is an improper access control vulnerability in Adobe Commerce that allows attackers to bypass security features and potentially disrupt...
Mar 27, 2023A sandbox escape vulnerability in macOS allows malicious applications to bypass security restrictions and access system resources or other application...
Dec 12, 2025This macOS vulnerability allows malicious applications to escape their security sandbox, potentially accessing system resources or other applications'...
Nov 4, 2025This CVE describes a file quarantine bypass vulnerability in macOS that allows applications to escape their sandbox restrictions. It affects macOS sys...
Sep 15, 2025This vulnerability allows attackers to bypass Cisco NX-OS image signature verification, enabling them to load unverified or malicious software onto af...
Dec 4, 2024CVE-2023-52164 allows unauthenticated attackers to read arbitrary files on Digiever DS-2105 Pro devices via the access_device.cgi endpoint. This affec...
Feb 3, 2025This CVE describes an improper access control vulnerability in FortiOS that allows an attacker with existing write access to the system to bypass file...
Aug 13, 2024In Gokapi versions before 2.2.3, registered users without proper privileges can create short-lived API keys with elevated permissions to create or mod...
Mar 6, 2026This vulnerability allows authenticated users in Devolutions Server to bypass client-side validation and edit permissions they shouldn't have access t...
Jun 5, 2025An improper access control vulnerability in Intel Tiber Edge Platform's Edge Orchestrator software allows unauthenticated attackers on adjacent networ...
May 13, 2025This vulnerability in Ansible Automation Platform allows attackers with read-only OAuth2 tokens to escalate privileges and gain write access to API en...
Nov 25, 2024This vulnerability in Directus allows attackers to bypass localhost access restrictions by using alternative loopback IP addresses like 127.0.0.2 inst...
Sep 18, 2024This vulnerability in Oracle PeopleSoft Enterprise PeopleTools allows high-privileged attackers with network access via HTTP to gain unauthorized acce...
Oct 21, 2025This vulnerability allows authenticated attackers to download arbitrary files from AOS-10 GW and AOS-8 Controller/Mobility Conductor systems via the C...
Oct 14, 2025An authenticated attacker can download arbitrary files from AOS-10 GW and AOS-8 Controller/Mobility Conductor systems through the web management inter...
Oct 14, 2025This vulnerability allows authenticated attackers to download arbitrary files from AOS-10 GW and AOS-8 Controller/Mobility Conductor systems through t...
Oct 14, 2025This vulnerability allows authenticated attackers to download arbitrary files from AOS-10 GW and AOS-8 Controller/Mobility Conductor systems via CLI b...
Oct 14, 2025This vulnerability allows authenticated administrators on EdgeConnect SD-WAN ECOS systems to access sensitive system files they shouldn't have permiss...
Sep 16, 2025CVE-2025-27702 is a privilege escalation vulnerability in Absolute Secure Access management console where administrators with specific permissions can...
May 28, 2025This vulnerability in Oracle MySQL Cluster allows high-privileged attackers with network access to cause denial of service by crashing or hanging the ...
Apr 15, 2025This vulnerability in Oracle MySQL Server's Prepared Statements component allows high-privileged attackers with network access to cause a denial of se...
Apr 15, 2025This vulnerability in Mercedes-Benz NTG6 head units allows attackers with physical access to Ethernet pins to access the internal vehicle network. Thr...
Feb 13, 2025A privilege escalation vulnerability in GitLab allows Developer users with the 'admin_compliance_framework' custom role to modify group namespace URLs...
Jul 11, 2024An improper access control vulnerability in Fortinet FortiADC allows authenticated read-only users to perform unauthorized write actions via crafted H...
Jul 9, 2024This vulnerability in Oracle MySQL Connector/Python allows low-privileged attackers with network access to potentially access sensitive data through s...
Apr 15, 2025This vulnerability allows authenticated attackers to tamper with Windows Remote Desktop Services, potentially disrupting legitimate connections or alt...
Oct 8, 2024This vulnerability in Oracle Java SE's 2D component allows unauthenticated attackers with network access to potentially modify or read some accessible...
Jul 16, 2024This vulnerability in mingSoft MCMS 6.1.1 allows remote attackers to upload arbitrary files via the /ms/file/uploadTemplate.do endpoint. This unrestri...
Feb 18, 2026About Improper Access Control (CWE-284)
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Our database tracks 1,311 CVEs classified as CWE-284, with 216 rated critical and 558 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.
External reference: View CWE-284 on MITRE CWE →
Monitor Improper Access Control Vulnerabilities
Get alerted when new Improper Access Control CVEs affect your infrastructure.
Start Monitoring Free