CWE-284: Improper Access Control
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Yearly Trend
Top Affected Vendors
All Improper Access Control CVEs (1,302)
This vulnerability in AnyDesk allows a remote user with 'Control my device' permission to modify settings and set a Full Access password without confi...
Nov 6, 2025This vulnerability allows malicious macOS/iOS apps to escape their sandbox restrictions, potentially accessing system resources or other apps' data. I...
Sep 15, 2025An improper access control vulnerability in Microsoft Power Pages allows unauthorized attackers to bypass user registration controls and elevate privi...
Feb 19, 2025This vulnerability in Intel Graphics Driver installers allows authenticated local users to escalate privileges on affected systems. Attackers could ga...
Feb 12, 2025This vulnerability allows authenticated attackers to elevate their privileges within Microsoft SharePoint, potentially gaining administrative access. ...
Dec 12, 2024This vulnerability in Intel EMA software allows authenticated users with local access to potentially escalate privileges due to improper access contro...
Nov 13, 2024Insecure permissions in the Bluetooth Low Energy (BLE) component of the Fire-Boltt Artillery Smart Watch NJ-R6E-10.3 allow attackers to cause a Denial...
Oct 8, 2024An improper access control vulnerability in Baxter Connex health portal allows unauthenticated attackers to gain unauthorized database access and modi...
Sep 9, 2024This vulnerability allows attackers with kernel-level access to bypass AMD's System Management Mode (SMM) ROM protections, potentially enabling firmwa...
Jun 18, 2024This vulnerability allows attackers to cause a Denial of Service (DoS) in Tormach xsTECH CNC routers by overwriting the Hostmot2 configuration cookie ...
Apr 22, 2024This vulnerability in Mbed TLS and Mbed Crypto allows attackers to potentially access sensitive cryptographic data or cause denial of service through ...
Mar 29, 2024This vulnerability in Intel Thunderbolt DCH drivers for Windows allows authenticated local users to escalate privileges due to improper access control...
Feb 14, 2024This vulnerability allows attackers to escape the Artemis Java Test Sandbox by loading untrusted native libraries via System.load or System.loadLibrar...
Jan 19, 2024This vulnerability allows a privileged user with local access to bypass access controls in Intel Aptio V UEFI Firmware Integrator Tools, potentially e...
Nov 14, 2023CVE-2023-30969 is an authentication/authorization bypass vulnerability in Palantir Tiles1 service where API endpoints lack proper access controls. Thi...
Oct 26, 2023This vulnerability allows unauthenticated remote attackers to download and upload arbitrary files via anonymous FTP access to SICK APU devices. It aff...
Oct 9, 2023This vulnerability allows a privileged user on a Windows system with affected Intel WiFi software to escalate their privileges locally. It affects sys...
Aug 11, 2023This vulnerability allows a privileged user on a local system to escalate privileges through improper access control in Intel PROSet/Wireless WiFi and...
Aug 11, 2023This vulnerability in Intel SUR software allows authenticated local users to escalate privileges due to improper access control. Attackers could gain ...
May 10, 2023This Moodle vulnerability allows remote attackers to set the 'start page' preference for other users, bypassing intended access controls. Attackers ca...
Feb 17, 2023Axigen Mail Server versions before 10.5.57 contain an improper access control vulnerability in the WebAdmin interface. A delegated admin account with ...
Feb 5, 2026OpenSlides versions before 4.2.29 have an authentication bypass vulnerability where users synced via external SAML identity providers can be logged in...
Feb 4, 2026This vulnerability allows authenticated attackers with customer-level permissions or higher to access and modify other vendors' store settings in the ...
Jan 20, 2026OpenSIS 9.2 and below contains an incorrect access control vulnerability in Student.php that allows authenticated low-privilege users to perform unaut...
Dec 9, 2025This vulnerability in SuperDuper! v3.10 allows attackers to escalate privileges to root through improper access control in the SDAgent component. The ...
Dec 1, 2025This vulnerability in Oracle Essbase Web Platform allows authenticated attackers with low privileges to remotely manipulate or access critical data vi...
Oct 21, 2025phpMyFAQ versions 4.0-nightly-2025-10-03 and below allow multiple user accounts to be registered with the same email address due to missing uniqueness...
Oct 3, 2025The mcp-database-server fails to properly enforce read-only mode, allowing attackers to execute unauthorized database operations. This affects users o...
Sep 16, 2025CVE-2025-56274 is an access control vulnerability in SourceCodester Web-based Pharmacy Product Management System 1.0 that allows low-privileged users ...
Sep 15, 2025This vulnerability allows users without proper delete privileges to bypass access controls and delete products via the mass-delete endpoint in UnoPim....
Aug 22, 2025This vulnerability in Oracle Universal Work Queue allows authenticated attackers with low privileges to perform unauthorized data manipulation (create...
Jul 15, 2025An improper access control vulnerability in Microsoft Azure allows unauthorized attackers to access and disclose sensitive information over the networ...
May 8, 2025This vulnerability in Oracle PeopleSoft Enterprise CC Common Application Objects allows authenticated attackers with low privileges to perform unautho...
Apr 15, 2025CVE-2024-44313 is an incorrect access control vulnerability in TastyIgniter 3.7.6 that allows unauthorized users to access and generate invoices witho...
Mar 18, 2025This vulnerability allows authenticated users in Devolutions Server to bypass browser extension restrictions, potentially enabling malicious browser e...
Mar 13, 2025This vulnerability allows attackers to bypass access controls in Serosoft Academia SIS EagleR v1.0.118, enabling them to create and modify user accoun...
Mar 3, 2025An improper access control vulnerability in Odoo's auth_oauth module allows internal users to export OAuth tokens belonging to other users. This affec...
Feb 25, 2025Sage DPW versions before 2024_12_001 have an improper access control vulnerability where server-side role checks are inconsistently enforced. Low-priv...
Feb 18, 2025Adobe Commerce has an improper access control vulnerability that allows low-privileged attackers to bypass security measures and gain unauthorized acc...
Feb 11, 2025This vulnerability in vaultwarden allows an attacker who is an owner/admin of one organization to gain owner rights over another organization by knowi...
Jan 27, 2025This vulnerability in Open Virtual Network (OVN) allows specially crafted UDP packets to bypass egress access control lists (ACLs), potentially enabli...
Jan 23, 2025This vulnerability in GLPI allows authenticated users to delete any user account via a specific application endpoint. It affects GLPI versions 10.0.0 ...
Dec 11, 2024An unauthenticated attacker can exploit inadequate access controls in Mitel MiContact Center Business's legacy chat component to access sensitive info...
Oct 1, 2024TestLink 1.9.20 has an access control vulnerability in the TestPlan editing function that allows users with minimal privileges to view and modify all ...
Sep 27, 2024CVE-2024-45170 is an improper access control vulnerability in za-internet C-MOR Video Surveillance software that allows low-privileged users to perfor...
Sep 4, 2024Kamaji versions 1.0.0 and earlier have an RBAC misconfiguration that allows Kubernetes control plane API servers to access and manipulate data from ot...
Aug 12, 2024This vulnerability allows attackers to execute arbitrary code or commands on Fortinet FortiManager devices through specially crafted HTTP requests due...
Mar 12, 2024The Cloudflare WordPress plugin has an improper authentication vulnerability that allows attackers with lower-privileged WordPress accounts to access ...
Jan 29, 2024This vulnerability in Nokia WaveLite products allows local users to create new administrative accounts by manipulating web requests when security hard...
Oct 4, 2023This authentication bypass vulnerability in Open Automation Software OAS Platform allows attackers to gain unauthorized access by sending specially-cr...
Sep 5, 2023About Improper Access Control (CWE-284)
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Our database tracks 1,302 CVEs classified as CWE-284, with 214 rated critical and 552 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.
External reference: View CWE-284 on MITRE CWE →
Monitor Improper Access Control Vulnerabilities
Get alerted when new Improper Access Control CVEs affect your infrastructure.
Start Monitoring Free