CWE-284: Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Yearly Trend
Top Affected Vendors
All Improper Access Control CVEs (1,311)
A permission inheritance vulnerability in Directus allows stale field-level permissions to persist after field deletion. When a deleted field's name i...
Nov 13, 2025This vulnerability allows physically proximate attackers to bypass USB debugging authorization on Motorola Droid Razr HD devices, enabling full device...
Feb 27, 2025This Secure Boot vulnerability allows attackers with physical access or administrative privileges to bypass security features during the boot process....
Jan 14, 2025An improper access control vulnerability in Intel RAID Web Console allows authenticated users on the same network segment to potentially cause denial ...
Sep 16, 2024This vulnerability allows attackers with valid viewer join links to manipulate BigBlueButton into generating signed moderator links, enabling unauthor...
Jun 28, 2024This vulnerability in Intel CIP software allows unprivileged software running with a privileged user to potentially disclose information via adjacent ...
Nov 11, 2025A macOS vulnerability allows apps with root privileges to access private information due to insufficient redaction of sensitive data. This affects mac...
Feb 11, 2026This CVE describes an improper access control vulnerability in Windows Hyper-V that allows an authenticated attacker with local access to a Hyper-V ho...
Jan 13, 2026This vulnerability in Intel's Kubernetes Device Plugins allows privileged users to potentially cause denial of service through local access. It affect...
Aug 12, 2025This vulnerability allows unauthorized access to bypass app lock protections on affected Huawei devices. Attackers could access locked applications wi...
May 6, 2025This vulnerability allows authenticated users with local access to potentially escalate privileges on systems running vulnerable Intel Granulate softw...
Nov 13, 2024This vulnerability allows malicious applications with root privileges to modify system files on affected Apple operating systems. It affects visionOS ...
Sep 17, 2024This vulnerability in Intel CST software allows authenticated local users to potentially escalate privileges due to improper access control. It affect...
May 16, 2024OpenProject versions before 17.0.5 and 17.1.2 contain an improper authentication vulnerability that allows attackers to create wiki pages in projects ...
Mar 5, 2026This vulnerability in IBM Cloud Pak System allows authenticated users to perform unauthorized actions due to improper access controls. It affects IBM ...
Feb 17, 2026This vulnerability in Gitea allows users with read access to pull requests to cancel scheduled auto-merges created by other users. It's an authorizati...
Jan 22, 2026CVE-2026-24039 is an improper access control vulnerability in Horilla HRMS version 1.4.0 that allows low-privileged employees to self-approve document...
Jan 22, 2026This vulnerability allows any authenticated employee in Horilla HRMS to upload documents on behalf of any other employee without proper authorization....
Jan 22, 2026This CVE describes an authorization bypass vulnerability in Pimcore's API endpoint for static routes. Authenticated backend users without proper permi...
Jan 15, 2026This vulnerability allows authenticated backend users without proper permissions to access the complete list of Predefined Properties configurations i...
Jan 15, 2026LibreChat version 0.8.1-rc2 has an improper access control vulnerability where authenticated users can read permissions of arbitrary agents by knowing...
Jan 7, 2026This vulnerability in Plane.io allows guest users to access an API endpoint that lists workspace members, potentially exposing admin email addresses t...
Jan 2, 2026CVE-2025-67715 is an information disclosure vulnerability in Weblate that allows unauthorized API access to user notification settings and user lists....
Dec 16, 2025This vulnerability allows authenticated users in Xinhu Rainrock RockOA 2.7.0 to modify PHP configuration files through a specific endpoint. Attackers ...
Dec 9, 2025CVE-2025-65796 is an improper access control vulnerability in usememos memos v0.25.2 that allows authenticated users with low-level privileges to dele...
Dec 8, 2025Open WebUI v0.6.33 has an access control vulnerability where the /api/tasks/stop/ endpoint allows any authenticated user to cancel arbitrary LLM respo...
Dec 4, 2025This vulnerability in RomM (ROM Manager) allows authenticated users to access private game collections belonging to other users by directly querying c...
Dec 3, 2025This vulnerability allows attackers with low-level privileges to read server logs via the /aux1/ocussd/trace endpoint in OpenCode Systems USSD Gateway...
Nov 26, 2025The Database Inventory Plugin for GLPI allows any authenticated user to send requests to inventory agents, potentially enabling unauthorized access to...
Nov 18, 2025An incorrect access control vulnerability in Desktop Alert PingAlert's Application Server (versions 6.1.0.11 to 6.1.1.2) allows unauthorized remote ac...
Nov 14, 2025The Tutor LMS WordPress plugin up to version 3.8.3 contains an access control vulnerability that allows authenticated users with tutor-level permissio...
Oct 25, 2025This vulnerability allows unauthorized users to view limited course information they shouldn't have access to due to insufficient permission checks in...
Oct 23, 2025This vulnerability allows users with lower-level permissions to access cohort information from the system context, potentially exposing restricted adm...
Oct 23, 2025This vulnerability in Oracle Applications Framework allows authenticated attackers with low privileges to modify data through the Upload Attachments c...
Oct 21, 2025This vulnerability in Oracle Applications Framework allows authenticated attackers with low privileges to modify data through HTTP requests. It affect...
Oct 21, 2025An improper access control vulnerability in Samsung Exynos processors allows unauthorized access to log files. This affects devices using Exynos 980, ...
Oct 20, 2025This vulnerability allows authenticated users in Tenable Security Center to access resources beyond their assigned permissions. It affects all Tenable...
Oct 8, 2025Discourse versions 3.5.0 and below contain an authorization bypass vulnerability in AI suggestion endpoints. Authenticated users can access restricted...
Oct 1, 2025The SmartCrawl SEO plugin for WordPress has an authorization bypass vulnerability that allows authenticated users with Subscriber-level access or high...
Sep 30, 2025This vulnerability in IBM License Metric Tool allows authenticated users to bypass access controls in the REST API interface, enabling unauthorized ac...
Sep 29, 2025The Jenkins global-build-stats plugin has a missing authorization vulnerability in its REST API endpoints. Attackers with Overall/Read permission can ...
Sep 3, 2025This vulnerability allows authenticated back-end users in Contao CMS to access modules they shouldn't have permission to view. It affects Contao insta...
Aug 28, 2025A vulnerability in the RISC-V BOOMv1.2 processor implementation causes valid memory store operations to incorrectly trigger access faults, potentially...
Aug 19, 2025Netwrix Directory Manager versions 11.0.0.0 through 11.1.25162.01 expose sensitive information in data sent to authenticated users. This vulnerability...
Aug 7, 2025CVE-2025-53112 is an improper access control vulnerability in GLPI that allows unauthorized users to delete specific resources. This affects GLPI inst...
Jul 30, 2025An improper access control vulnerability in FortiIsolator's logging component allows authenticated read-only users to alter logs via crafted HTTP requ...
Jul 18, 2025This vulnerability allows authenticated WordPress users with Subscriber-level access or higher to modify the featured image of any post without proper...
May 30, 2025This vulnerability allows attackers to bypass the user limit for direct messages (DMs) in Discourse, potentially creating DMs that include every user ...
Apr 30, 2025This CVE allows low-privileged Splunk users without admin or power roles to edit and delete other users' data in App Key Value Store (KVStore) collect...
Mar 26, 2025Unifiedtransform 2.0 has an incorrect access control vulnerability that allows teachers to take attendance for other teachers. This affects all deploy...
Mar 17, 2025About Improper Access Control (CWE-284)
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Our database tracks 1,311 CVEs classified as CWE-284, with 216 rated critical and 558 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.
External reference: View CWE-284 on MITRE CWE →
Monitor Improper Access Control Vulnerabilities
Get alerted when new Improper Access Control CVEs affect your infrastructure.
Start Monitoring Free