CWE-284: Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Yearly Trend
Top Affected Vendors
All Improper Access Control CVEs (1,300)
This broken access control vulnerability in File Browser allows authenticated users with only Create permission to delete files and directories they s...
Mar 5, 2026This vulnerability in RuoYi v4.8.2 allows unauthorized attackers to modify data they shouldn't have access to due to improper access control in the up...
Jan 23, 2026Gitea versions before 1.25.4 have an improper access control vulnerability where attachments uploaded to private repositories can be linked to release...
Jan 22, 2026CVE-2026-20897 is an improper access control vulnerability in Gitea where users with write access to any repository can delete Git LFS locks belonging...
Jan 22, 2026Gitea contains an authorization bypass vulnerability where users with project write access in one organization can modify projects belonging to other ...
Jan 22, 2026This vulnerability allows unauthenticated remote attackers to bypass access controls on TOTOLINK routers. Attackers can send malicious payloads to vul...
Dec 15, 2025CVE-2025-66430 is an incorrect access control vulnerability in Plesk's Password Protected Directories feature that allows authenticated Plesk users to...
Dec 12, 2025This vulnerability allows a physically proximate attacker to access internal components of Entrust nShield HSM appliances without leaving tamper evide...
Dec 2, 2025This vulnerability allows unauthenticated remote attackers to bypass authentication on Axel Technology puma devices and perform administrative actions...
Nov 19, 2025Dell Data Lakehouse versions before 1.6.0.0 have an improper access control vulnerability that allows high-privileged attackers with remote access to ...
Nov 12, 2025This vulnerability allows unauthorized attackers to access restricted administrative routes in eTimeTrackLite Web and modify database connection confi...
Oct 27, 2025The BATBToken smart contract contains critical access control vulnerabilities in whitelist management functions. Any user can bypass transfer restrict...
Oct 6, 2025A critical authentication bypass vulnerability in Termix versions 1.5.0 and below allows unauthenticated attackers to access the /ssh/db/host/internal...
Oct 1, 2025This vulnerability in Zimbra Collaboration (ZCS) allows attackers with valid user credentials to bypass Two-Factor Authentication (2FA) protection by ...
Sep 16, 2025CVE-2024-45438 is an authentication bypass vulnerability in TitanHQ SpamTitan Email Security Gateway that allows unauthenticated attackers to create u...
Aug 21, 2025This CVE describes an access control bypass vulnerability in Apache HTTP Server's mod_ssl module when using TLS 1.3 session resumption. Organizations ...
Jul 10, 2025This vulnerability allows unauthorized access to device groups in Northern.tech Mender Server due to improper access control. Attackers can potentiall...
Jun 26, 2025CryptPad versions before 2025.3.0 have a critical 2FA bypass vulnerability. Attackers who obtain user credentials can access accounts even with 2FA en...
Jun 18, 2025The Tinxy WiFi Lock Controller v1 RF transmits on an open Wi-Fi network without authentication, allowing attackers to join the network and potentially...
May 30, 2025This vulnerability in Jenkins OpenID Connect Provider Plugin allows attackers who can configure jobs to craft build ID tokens that impersonate trusted...
May 14, 2025This CVE describes an Improper Access Control vulnerability in Adobe ColdFusion that allows high-privileged attackers to read arbitrary files from the...
May 13, 2025This vulnerability allows attackers to use Siri voice commands on locked iOS/iPadOS devices to enable Auto-Answer Calls, potentially allowing unauthor...
May 12, 2025An incorrect access control vulnerability in flaskBlog v2.6.1 allows unauthenticated attackers to retrieve all usernames via crafted input. This affec...
Apr 21, 2025This vulnerability allows unauthorized attackers to execute arbitrary commands with Administrator privileges on Itel Electronics IP Stream version 1.7...
Apr 18, 2025This vulnerability allows unauthenticated attackers to bypass authentication and access the admin panel of JMBroadcast JMB0150 devices. Attackers can ...
Apr 18, 2025IROAD Dashcam V devices use an unregistered public domain name for internal communication, creating a security vulnerability. If an attacker registers...
Mar 18, 2025This vulnerability allows unauthorized gNOI requests to bypass security controls on Arista EOS devices with OpenConfig enabled, potentially enabling a...
Mar 4, 2025This vulnerability allows attackers to bypass authentication requirements for Firefox's Focus feature when users have enabled authentication protectio...
Mar 4, 2025This vulnerability allows unauthenticated attackers to create and modify user accounts, including Administrator accounts, in Serosoft Academia SIS Eag...
Mar 3, 2025Infoblox NIOS through version 8.6.4 has improper access control for Grids, allowing unauthorized users to access or modify Grid configurations. This a...
Feb 27, 2025Lexmark MX6500 printers with firmware LW75.JD.P296 and earlier have incorrect access control settings that allow unauthorized users to bypass security...
Feb 19, 2025CVE-2024-46627 is an incorrect access control vulnerability in BECN DATAGERRY v2.2 that allows attackers to bypass authentication and execute arbitrar...
Sep 26, 2024An unauthenticated attacker can directly access the /admin/add_room_controller.php endpoint in Kashipara Hotel Management System v1.0 to add unauthori...
Aug 22, 2024CVE-2024-28805 is an incorrect access control vulnerability in Italtel i-MCS NFV 12.1.0-20211215 that allows unauthorized users to bypass authenticati...
Jul 29, 2024CVE-2024-22187 is an unauthenticated write-what-where vulnerability in AutomationDirect P3-550E's Programming Software Connection Remote Memory Diagno...
May 28, 2024A use-after-free vulnerability in the Linux kernel's IOMMUFD subsystem allows attackers to corrupt memory when splitting I/O page table areas. This af...
May 21, 2024An improper access control vulnerability in Mitel SIP phones allows unauthenticated attackers to access user information or system configuration. This...
May 2, 2024This vulnerability allows high-privileged attackers with network access via HTTP to compromise Oracle Workflow in Oracle E-Business Suite, potentially...
Apr 16, 2024This vulnerability allows remote attackers to modify device settings on Silex Technology DS-600 devices via an unauthenticated SAVE EEP_DATA command. ...
Apr 15, 2024Alldata V0.4.6 has an incorrect access control vulnerability that leaks sensitive API documentation through unauthenticated endpoints like /api/system...
Apr 2, 2024This vulnerability allows Project Owners or Organization Owners in Datalust Seq to escalate their privileges to System-level access, bypassing intende...
Mar 21, 2024This vulnerability in Net::IPv4Addr 0.10 for Perl allows attackers to bypass IP-based access controls by using IP addresses with extraneous zero chara...
Mar 18, 2024This vulnerability in Lustre file systems allows attackers to bypass access controls, potentially escalating privileges and accessing sensitive inform...
Mar 7, 2024This vulnerability allows remote attackers to retrieve Wi-Fi credentials and system information from Totolink N200RE_V5 routers without authentication...
Jan 10, 2024CVE-2023-47110 is an improper access control vulnerability in the blockreassurance PrestaShop module that allows attackers to modify any value in the ...
Nov 9, 2023This vulnerability in BoltWire v6.03 allows remote attackers to bypass authentication and access sensitive administrative functions, including viewing...
Nov 7, 2023This vulnerability in Decidim's templates module allows any authenticated user to access administrative template management functions, enabling unauth...
Oct 6, 2023This vulnerability in Hikvision Hybrid SAN/Cluster Storage products allows attackers to bypass access controls and gain administrative privileges by s...
Apr 11, 2023CVE-2023-27578 is an insufficient permission check vulnerability in Galaxy data analysis platform that allows attackers to modify, delete, copy, or im...
Mar 20, 2023This vulnerability in Omron CJ1M PLC units allows attackers to overwrite the UM password memory region via PROGRAM AREA WRITE commands. This can disab...
Mar 16, 2023About Improper Access Control (CWE-284)
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Our database tracks 1,300 CVEs classified as CWE-284, with 214 rated critical and 551 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.
External reference: View CWE-284 on MITRE CWE →
Monitor Improper Access Control Vulnerabilities
Get alerted when new Improper Access Control CVEs affect your infrastructure.
Start Monitoring Free