CWE-284: Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

1,311
Total CVEs
216
Critical
558
High
7.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
124
2025
669
2024
305
2023
121
2022
36

Top Affected Vendors

1 Microsoft 84
2 Apple 79
3 Oracle 57
4 Intel 32
5 Cisco 22
6 Adobe 21
7 Dell 20
8 Fabian 17
9 Mattermost 12
10 Campcodes 11

All Improper Access Control CVEs (1,311)

CVE-2024-13430
4.3

The Page Builder: Pagelayer WordPress plugin has an information exposure vulnerability that allows authenticated attackers with Contributor-level acce...

Mar 12, 2025
CVE-2025-25616
4.3

Unifiedtransform 2.0 has an access control vulnerability that allows students to modify exam rules through the /exams/edit-rule endpoint. This affects...

Mar 10, 2025
CVE-2025-25617
4.3

CVE-2025-25617 is an incorrect access control vulnerability in Unifiedtransform 2.X that allows teachers to escalate privileges by creating syllabus c...

Mar 7, 2025
CVE-2024-13855
4.3

This vulnerability allows authenticated WordPress users with Contributor-level access or higher to bypass access controls and view non-public posts (d...

Feb 20, 2025
CVE-2024-13854
4.3

The Education Addon for Elementor WordPress plugin has an Insecure Direct Object Reference vulnerability that allows authenticated attackers with Cont...

Feb 19, 2025
CVE-2024-13229
4.3

The Rank Math SEO WordPress plugin has an authorization vulnerability that allows authenticated users with Contributor-level access or higher to delet...

Feb 13, 2025
CVE-2025-24423
4.3

Adobe Commerce has an improper access control vulnerability (CWE-284) that allows low-privileged attackers to escalate privileges and modify select da...

Feb 11, 2025
CVE-2025-24532
4.3

This vulnerability affects Siemens SCALANCE industrial wireless devices with SNMPv3 configured. It allows authenticated users with 'user' role to impr...

Feb 11, 2025
CVE-2024-45326
4.3

An authenticated attacker with no privileges can perform unauthorized operations on FortiDeceptor central management appliances by sending crafted req...

Jan 14, 2025
CVE-2024-43716
4.3

Adobe Experience Manager versions 6.5.21 and earlier have an improper access control vulnerability that allows low-privileged attackers to bypass secu...

Dec 10, 2024
CVE-2024-54038
4.3

CVE-2024-54038 is an improper access control vulnerability in Adobe Connect that allows low-privileged attackers to bypass security measures. This aff...

Dec 10, 2024
CVE-2024-12307
4.3

A function-level access control vulnerability in Unifiedtransform version 2.0 and earlier allows teachers to modify student personal data without prop...

Dec 9, 2024
CVE-2024-11661
4.3

This vulnerability allows remote attackers to upload arbitrary files to the Free Exam Hall Seating Management System 1.0 via the profile.php image upl...

Nov 25, 2024
CVE-2024-48899
4.3

This vulnerability in Moodle allows authenticated users to view course badge lists for courses they shouldn't have access to. It's an improper access ...

Nov 20, 2024
CVE-2021-1410
4.3

This vulnerability allows authenticated remote attackers within an organization to modify other users' distribution lists in Cisco Webex Meetings. It ...

Nov 18, 2024
CVE-2021-3987
4.3

This vulnerability allows users without proper permissions to create public shelves in Calibre-Web, potentially exposing sensitive book collections. I...

Nov 15, 2024
CVE-2024-45735
4.3

This vulnerability allows low-privileged users without admin or power roles to view App Key Value Store (KV Store) deployment configuration and public...

Oct 14, 2024
CVE-2024-45130
4.3

This CVE describes an Improper Access Control vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security measures. Affect...

Oct 10, 2024
CVE-2024-45121
4.3

CVE-2024-45121 is an Improper Access Control vulnerability in Adobe Commerce that allows low-privileged attackers to bypass security features. This af...

Oct 10, 2024
CVE-2024-9003
4.3

This vulnerability in Jinan Chicheng Company JFlow 2.0.0 allows attackers to bypass access controls in the attachment handler component, potentially e...

Sep 19, 2024
CVE-2024-3127
4.3

This vulnerability allows unauthorized users to bypass IP restrictions for GitLab groups via GraphQL, potentially performing unauthorized group-level ...

Aug 22, 2024
CVE-2024-32939
4.3

This vulnerability in Mattermost exposes remote users' email addresses when shared channels are enabled, even when email visibility is otherwise restr...

Aug 22, 2024
CVE-2024-43397
4.3

This vulnerability in Apollo configuration management system allows authenticated users to bypass permission checks by crafting specific requests. Att...

Aug 20, 2024
CVE-2024-7920
4.3

This vulnerability allows unauthorized remote access to the /Report/ParkCommon/GetParkInThroughDeivces endpoint in Anhui Deshun Intelligent Technology...

Aug 19, 2024
CVE-2024-39839
4.3

This vulnerability allows users on remote Mattermost servers to set arbitrary usernames that sync to local servers when shared channels are enabled. I...

Aug 1, 2024
CVE-2024-37883
4.3

This vulnerability in Nextcloud Deck allows users with access to a deck board to view comments and attachments from deleted cards, bypassing intended ...

Jun 14, 2024
CVE-2024-37279
4.3

This vulnerability allows view-only users in Kibana to abuse the run_soon API to trigger continuous execution of alerting rules. This could lead to re...

Jun 13, 2024
CVE-2024-28969
4.3

Dell Secure Connect Gateway (SCG) versions before 5.24.00.00 have an improper access control vulnerability in an internal update REST API. A remote lo...

Jun 13, 2024
CVE-2024-5272
4.3

This vulnerability in Mattermost allows guest users on channels with linked playbook runs to view all details of those runs when marked as finished. I...

May 26, 2024
CVE-2024-34152
4.3

This vulnerability allows guest users in Mattermost to access metadata of public playbook runs linked to channels they are guests in, bypassing intend...

May 26, 2024
CVE-2024-29215
4.3

This vulnerability allows authenticated Mattermost users to execute slash commands in channels they don't have access to by linking a playbook run to ...

May 26, 2024
CVE-2024-37386
4.2

This vulnerability in Stormshield Network Security (SNS) allows attackers to bypass secure boot protections and restart devices in single-user mode, p...

Jul 15, 2024
CVE-2025-64400
4.1

This vulnerability allows users with enrollment-level edit permissions to create users in organizations they don't belong to or have access to. It aff...

Dec 18, 2025
CVE-2024-30146
4.1

This vulnerability allows certain administrative users in HCL Domino Leap to import applications from the server's filesystem due to improper access c...

Apr 30, 2025
CVE-2024-52514
4.1

This Nextcloud vulnerability allows users who receive shared folders containing blocked files to copy the intermediate folder structure, potentially b...

Nov 15, 2024
CVE-2025-64715
4.0

This CVE describes a misconfiguration vulnerability in Cilium where AWS security group IDs referenced in CiliumNetworkPolicies that don't exist or are...

Nov 29, 2025
CVE-2025-26424
4.0

This CVE describes a cross-user data leak vulnerability in Android's VpnManager component where a logic error allows unauthorized access to VPN config...

Sep 4, 2025
CVE-2026-23522
3.7

This vulnerability in LobeChat allows authenticated users to delete files from any knowledge base without ownership verification due to a commented-ou...

Jan 19, 2026
CVE-2023-2112
3.6

This vulnerability in M-Files Desktop component service allows an authenticated user in one session to move laterally to another user's session, poten...

Apr 20, 2023
CVE-2026-0798
3.5

Gitea versions before 1.25.4 may send release notification emails for private repositories to users whose access has been revoked. This information di...

Jan 22, 2026
CVE-2026-20601
3.3

This CVE describes a permissions vulnerability in macOS that allows applications to monitor keystrokes without proper user authorization. It affects m...

Feb 11, 2026
CVE-2025-31186
3.3

This CVE describes a permissions vulnerability in Xcode that allows applications to bypass macOS Privacy preferences. This affects developers using Xc...

Jan 16, 2026
CVE-2024-44210
3.3

A macOS permissions vulnerability allows applications to access sensitive user data they shouldn't have permission to view. This affects macOS systems...

Jan 16, 2026
CVE-2025-43518
3.3

This CVE describes a logic flaw in Apple's spellcheck API that could allow malicious applications to access files they shouldn't have permission to vi...

Dec 12, 2025
CVE-2025-43404
3.3

A sandbox escape vulnerability in macOS allows malicious applications to bypass intended restrictions and access sensitive user data. This affects mac...

Dec 12, 2025
CVE-2025-14083
2.7

This vulnerability in Keycloak's Admin REST API exposes backend schema and rules due to improper access control. It could allow attackers to gather in...

Jan 21, 2026
CVE-2025-14082
2.7

This vulnerability in Keycloak Admin REST API allows unauthorized users to access sensitive role metadata due to insufficient authorization checks. It...

Dec 10, 2025
CVE-2026-20642
2.4

An input validation vulnerability in iOS/iPadOS allows someone with physical access to a locked device to view photos from the lock screen. This affec...

Feb 11, 2026
CVE-2024-54556
2.4

This vulnerability allows a user to view restricted content from the lock screen on Apple iOS and iPadOS devices due to improper state management. It ...

Jan 16, 2026
CVE-2025-43408
2.4

This vulnerability allows attackers with physical access to a locked macOS device to access contacts from the lock screen. It affects macOS users runn...

Nov 4, 2025

About Improper Access Control (CWE-284)

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Our database tracks 1,311 CVEs classified as CWE-284, with 216 rated critical and 558 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.

External reference: View CWE-284 on MITRE CWE →

Monitor Improper Access Control Vulnerabilities

Get alerted when new Improper Access Control CVEs affect your infrastructure.

Start Monitoring Free