CWE-284: Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

1,311
Total CVEs
216
Critical
558
High
7.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
124
2025
669
2024
305
2023
121
2022
36

Top Affected Vendors

1 Microsoft 84
2 Apple 79
3 Oracle 57
4 Intel 32
5 Cisco 22
6 Adobe 21
7 Dell 20
8 Fabian 17
9 Mattermost 12
10 Campcodes 11

All Improper Access Control CVEs (1,311)

CVE-2025-20219
5.3

This vulnerability allows unauthenticated remote attackers to bypass access control rules on Cisco ASA/FTD firewalls by sending traffic to loopback in...

Aug 14, 2025
CVE-2024-55402
5.3

An access control vulnerability in 4C Strategies Exonaut allows unauthorized users to access restricted functionality or data. This affects organizati...

Aug 6, 2025
CVE-2025-6786
5.3

The DocCheck Login WordPress plugin versions up to 1.1.5 contain an authentication bypass vulnerability that allows unauthenticated attackers to read ...

Jul 4, 2025
CVE-2025-27206
5.3

This CVE describes an Improper Access Control vulnerability in Adobe Commerce that allows attackers to bypass security measures and gain limited write...

Jun 10, 2025
CVE-2025-30726
5.3

This vulnerability in Oracle Application Object Library allows unauthenticated attackers with network access via HTTP to read sensitive data from Orac...

Apr 15, 2025
CVE-2025-27190
5.3

This CVE describes an Improper Access Control vulnerability in Adobe Commerce that allows attackers to bypass security measures and gain unauthorized ...

Apr 8, 2025
CVE-2024-13693
5.3

The Enfold WordPress theme has an authorization bypass vulnerability that allows unauthenticated attackers to export all theme settings. This can expo...

Feb 25, 2025
CVE-2025-0968
5.3

The ElementsKit Elementor addons plugin for WordPress has an information disclosure vulnerability that allows unauthenticated attackers to view any co...

Feb 19, 2025
CVE-2024-13457
5.3

The Event Tickets and Registration WordPress plugin has an Insecure Direct Object Reference vulnerability that allows unauthenticated attackers to vie...

Jan 30, 2025
CVE-2024-12370
5.3

The WP Hotel Booking plugin for WordPress has an authorization bypass vulnerability that allows unauthenticated attackers to add rooms with custom pri...

Jan 17, 2025
CVE-2024-10393
5.3

The Tutor LMS WordPress plugin vulnerability allows unauthenticated attackers to register user accounts even when site registration is disabled. This ...

Nov 21, 2024
CVE-2024-39285
5.3

This vulnerability in UEFI firmware for certain Intel server systems allows privileged users to bypass access controls and potentially read sensitive ...

Nov 13, 2024
CVE-2024-50353
5.3

A vulnerability in ICG.AspNetCore.Utilities.CloudStorage library causes incorrect SAS URI duration generation when users specify durations other than ...

Oct 30, 2024
CVE-2024-21248
5.3

This vulnerability in Oracle VM VirtualBox allows a low-privileged attacker with local access to compromise the virtualization software, potentially a...

Oct 15, 2024
CVE-2024-9321
5.3

This vulnerability allows attackers to bypass access controls in the SourceCodester Online Railway Reservation System 1.0 by manipulating the 'id' par...

Sep 29, 2024
CVE-2024-42022
5.3

An incorrect permission assignment vulnerability in Veeam products allows attackers with local access to modify product configuration files. This coul...

Sep 7, 2024
CVE-2024-5814
5.3

This TLS protocol vulnerability allows a malicious TLS 1.2 server to force a TLS 1.3 client with downgrade capability to use an unintended ciphersuite...

Aug 27, 2024
CVE-2024-41243
5.3

An unauthenticated attacker can access student marks data through the /smsa/view_marks.php endpoint in Kashipara Responsive School Management System. ...

Aug 7, 2024
CVE-2024-41245
5.3

An unauthenticated attacker can access teacher details in Kashipara Responsive School Management System v3.2.0 due to improper access controls on the ...

Aug 7, 2024
CVE-2024-41246
5.3

An unauthenticated access control vulnerability in Kashipara Responsive School Management System v3.2.0 allows remote attackers to view the administra...

Aug 7, 2024
CVE-2024-41248
5.3

An unauthenticated attacker can add new subject entries to the Kashipara Responsive School Management System by exploiting incorrect access control in...

Aug 7, 2024
CVE-2024-2191
5.3

This vulnerability in GitLab allows unauthorized users to view merge request titles that were configured to be visible only to project members. It aff...

Jun 27, 2024
CVE-2023-22250
5.3

CVE-2023-22250 is an improper access control vulnerability in Adobe Commerce that allows attackers to bypass security features and potentially disrupt...

Mar 27, 2023
CVE-2025-43393
5.2

A sandbox escape vulnerability in macOS allows malicious applications to bypass security restrictions and access system resources or other application...

Dec 12, 2025
CVE-2025-43481
5.2

This macOS vulnerability allows malicious applications to escape their security sandbox, potentially accessing system resources or other applications'...

Nov 4, 2025
CVE-2025-43332
5.2

This CVE describes a file quarantine bypass vulnerability in macOS that allows applications to escape their sandbox restrictions. It affects macOS sys...

Sep 15, 2025
CVE-2024-20397
5.2

This vulnerability allows attackers to bypass Cisco NX-OS image signature verification, enabling them to load unverified or malicious software onto af...

Dec 4, 2024
CVE-2023-52164
5.1

CVE-2023-52164 allows unauthenticated attackers to read arbitrary files on Digiever DS-2105 Pro devices via the access_device.cgi endpoint. This affec...

Feb 3, 2025
CVE-2024-36505
5.1

This CVE describes an improper access control vulnerability in FortiOS that allows an attacker with existing write access to the system to bypass file...

Aug 13, 2024
CVE-2026-29060
5.0

In Gokapi versions before 2.2.3, registered users without proper privileges can create short-lived API keys with elevated permissions to create or mod...

Mar 6, 2026
CVE-2025-0691
5.0

This vulnerability allows authenticated users in Devolutions Server to bypass client-side validation and edit permissions they shouldn't have access t...

Jun 5, 2025
CVE-2025-20076
5.0

An improper access control vulnerability in Intel Tiber Edge Platform's Edge Orchestrator software allows unauthenticated attackers on adjacent networ...

May 13, 2025
CVE-2024-11483
5.0

This vulnerability in Ansible Automation Platform allows attackers with read-only OAuth2 tokens to escalate privileges and gain write access to API en...

Nov 25, 2024
CVE-2024-46990
5.0

This vulnerability in Directus allows attackers to bypass localhost access restrictions by using alternative loopback IP addresses like 127.0.0.2 inst...

Sep 18, 2024
CVE-2025-53059
4.9

This vulnerability in Oracle PeopleSoft Enterprise PeopleTools allows high-privileged attackers with network access via HTTP to gain unauthorized acce...

Oct 21, 2025
CVE-2025-37142
4.9

This vulnerability allows authenticated attackers to download arbitrary files from AOS-10 GW and AOS-8 Controller/Mobility Conductor systems via the C...

Oct 14, 2025
CVE-2025-37143
4.9

An authenticated attacker can download arbitrary files from AOS-10 GW and AOS-8 Controller/Mobility Conductor systems through the web management inter...

Oct 14, 2025
CVE-2025-37140
4.9

This vulnerability allows authenticated attackers to download arbitrary files from AOS-10 GW and AOS-8 Controller/Mobility Conductor systems through t...

Oct 14, 2025
CVE-2025-37141
4.9

This vulnerability allows authenticated attackers to download arbitrary files from AOS-10 GW and AOS-8 Controller/Mobility Conductor systems via CLI b...

Oct 14, 2025
CVE-2025-37131
4.9

This vulnerability allows authenticated administrators on EdgeConnect SD-WAN ECOS systems to access sensitive system files they shouldn't have permiss...

Sep 16, 2025
CVE-2025-27702
4.9

CVE-2025-27702 is a privilege escalation vulnerability in Absolute Secure Access management console where administrators with specific permissions can...

May 28, 2025
CVE-2025-30710
4.9

This vulnerability in Oracle MySQL Cluster allows high-privileged attackers with network access to cause denial of service by crashing or hanging the ...

Apr 15, 2025
CVE-2025-30696
4.9

This vulnerability in Oracle MySQL Server's Prepared Statements component allows high-privileged attackers with network access to cause a denial of se...

Apr 15, 2025
CVE-2023-34403
4.9

This vulnerability in Mercedes-Benz NTG6 head units allows attackers with physical access to Ethernet pins to access the internal vehicle network. Thr...

Feb 13, 2025
CVE-2024-5257
4.9

A privilege escalation vulnerability in GitLab allows Developer users with the 'admin_compliance_framework' custom role to modify group namespace URLs...

Jul 11, 2024
CVE-2023-50181
4.9

An improper access control vulnerability in Fortinet FortiADC allows authenticated read-only users to perform unauthorized write actions via crafted H...

Jul 9, 2024
CVE-2025-30714
4.8

This vulnerability in Oracle MySQL Connector/Python allows low-privileged attackers with network access to potentially access sensitive data through s...

Apr 15, 2025
CVE-2024-43456
4.8

This vulnerability allows authenticated attackers to tamper with Windows Remote Desktop Services, potentially disrupting legitimate connections or alt...

Oct 8, 2024
CVE-2024-21145
4.8

This vulnerability in Oracle Java SE's 2D component allows unauthenticated attackers with network access to potentially modify or read some accessible...

Jul 16, 2024
CVE-2026-2666
4.7

This vulnerability in mingSoft MCMS 6.1.1 allows remote attackers to upload arbitrary files via the /ms/file/uploadTemplate.do endpoint. This unrestri...

Feb 18, 2026

About Improper Access Control (CWE-284)

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Our database tracks 1,311 CVEs classified as CWE-284, with 216 rated critical and 558 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.

External reference: View CWE-284 on MITRE CWE →

Monitor Improper Access Control Vulnerabilities

Get alerted when new Improper Access Control CVEs affect your infrastructure.

Start Monitoring Free