CWE-284: Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

1,302
Total CVEs
214
Critical
552
High
7.2
Avg CVSS
2
In CISA KEV

Yearly Trend

2026
123
2025
669
2024
305
2023
121
2022
36

Top Affected Vendors

1 Microsoft 84
2 Apple 79
3 Oracle 57
4 Intel 32
5 Cisco 21
6 Adobe 20
7 Dell 19
8 Fabian 17
9 Mattermost 12
10 Campcodes 11

All Improper Access Control CVEs (1,302)

CVE-2025-27919
8.2

This vulnerability in AnyDesk allows a remote user with 'Control my device' permission to modify settings and set a Full Access password without confi...

Nov 6, 2025
CVE-2025-43371
8.2

This vulnerability allows malicious macOS/iOS apps to escape their sandbox restrictions, potentially accessing system resources or other apps' data. I...

Sep 15, 2025
CVE-2025-24989
KEV EPSS 25.7% 8.2

An improper access control vulnerability in Microsoft Power Pages allows unauthorized attackers to bypass user registration controls and elevate privi...

Feb 19, 2025
CVE-2024-38310
8.2

This vulnerability in Intel Graphics Driver installers allows authenticated local users to escalate privileges on affected systems. Attackers could ga...

Feb 12, 2025
CVE-2024-49068
8.2

This vulnerability allows authenticated attackers to elevate their privileges within Microsoft SharePoint, potentially gaining administrative access. ...

Dec 12, 2024
CVE-2024-32483
8.2

This vulnerability in Intel EMA software allows authenticated users with local access to potentially escalate privileges due to improper access contro...

Nov 13, 2024
CVE-2024-46539
8.2

Insecure permissions in the Bluetooth Low Energy (BLE) component of the Fire-Boltt Artillery Smart Watch NJ-R6E-10.3 allow attackers to cause a Denial...

Oct 8, 2024
CVE-2024-6796
8.2

An improper access control vulnerability in Baxter Connex health portal allows unauthenticated attackers to gain unauthorized database access and modi...

Sep 9, 2024
CVE-2022-23829
8.2

This vulnerability allows attackers with kernel-level access to bypass AMD's System Management Mode (SMM) ROM protections, potentially enabling firmwa...

Jun 18, 2024
CVE-2024-22811
8.2

This vulnerability allows attackers to cause a Denial of Service (DoS) in Tormach xsTECH CNC routers by overwriting the Hostmot2 configuration cookie ...

Apr 22, 2024
CVE-2024-28960
8.2

This vulnerability in Mbed TLS and Mbed Crypto allows attackers to potentially access sensitive cryptographic data or cause denial of service through ...

Mar 29, 2024
CVE-2023-22293
8.2

This vulnerability in Intel Thunderbolt DCH drivers for Windows allows authenticated local users to escalate privileges due to improper access control...

Feb 14, 2024
CVE-2024-23681
8.2

This vulnerability allows attackers to escape the Artemis Java Test Sandbox by loading untrusted native libraries via System.load or System.loadLibrar...

Jan 19, 2024
CVE-2022-36396
8.2

This vulnerability allows a privileged user with local access to bypass access controls in Intel Aptio V UEFI Firmware Integrator Tools, potentially e...

Nov 14, 2023
CVE-2023-30969
8.2

CVE-2023-30969 is an authentication/authorization bypass vulnerability in Palantir Tiles1 service where API endpoints lack proper access controls. Thi...

Oct 26, 2023
CVE-2023-43696
8.2

This vulnerability allows unauthenticated remote attackers to download and upload arbitrary files via anonymous FTP access to SICK APU devices. It aff...

Oct 9, 2023
CVE-2023-28714
8.2

This vulnerability allows a privileged user on a Windows system with affected Intel WiFi software to escalate their privileges locally. It affects sys...

Aug 11, 2023
CVE-2022-27635
8.2

This vulnerability allows a privileged user on a local system to escalate privileges through improper access control in Intel PROSet/Wireless WiFi and...

Aug 11, 2023
CVE-2022-40207
8.2

This vulnerability in Intel SUR software allows authenticated local users to escalate privileges due to improper access control. Attackers could gain ...

May 10, 2023
CVE-2023-23923
8.2

This Moodle vulnerability allows remote attackers to set the 'start page' preference for other users, bypassing intended access controls. Attackers ca...

Feb 17, 2023
CVE-2025-68721
8.1

Axigen Mail Server versions before 10.5.57 contain an improper access control vulnerability in the WebAdmin interface. A delegated admin account with ...

Feb 5, 2026
CVE-2026-25519
8.1

OpenSlides versions before 4.2.29 have an authentication bypass vulnerability where users synced via external SAML identity providers can be logged in...

Feb 4, 2026
CVE-2025-14977
8.1

This vulnerability allows authenticated attackers with customer-level permissions or higher to access and modify other vendors' store settings in the ...

Jan 20, 2026
CVE-2025-65594
8.1

OpenSIS 9.2 and below contains an incorrect access control vulnerability in Student.php that allows authenticated low-privilege users to perform unaut...

Dec 9, 2025
CVE-2025-57489
8.1

This vulnerability in SuperDuper! v3.10 allows attackers to escalate privileges to root through improper access control in the SDAgent component. The ...

Dec 1, 2025
CVE-2025-61763
8.1

This vulnerability in Oracle Essbase Web Platform allows authenticated attackers with low privileges to remotely manipulate or access critical data vi...

Oct 21, 2025
CVE-2025-59943
8.1

phpMyFAQ versions 4.0-nightly-2025-10-03 and below allow multiple user accounts to be registered with the same email address due to missing uniqueness...

Oct 3, 2025
CVE-2025-59333
8.1

The mcp-database-server fails to properly enforce read-only mode, allowing attackers to execute unauthorized database operations. This affects users o...

Sep 16, 2025
CVE-2025-56274
8.1

CVE-2025-56274 is an access control vulnerability in SourceCodester Web-based Pharmacy Product Management System 1.0 that allows low-privileged users ...

Sep 15, 2025
CVE-2025-55741
8.1

This vulnerability allows users without proper delete privileges to bypass access controls and delete products via the mass-delete endpoint in UnoPim....

Aug 22, 2025
CVE-2025-50105
8.1

This vulnerability in Oracle Universal Work Queue allows authenticated attackers with low privileges to perform unauthorized data manipulation (create...

Jul 15, 2025
CVE-2025-33072
8.1

An improper access control vulnerability in Microsoft Azure allows unauthorized attackers to access and disclose sensitive information over the networ...

May 8, 2025
CVE-2025-30735
8.1

This vulnerability in Oracle PeopleSoft Enterprise CC Common Application Objects allows authenticated attackers with low privileges to perform unautho...

Apr 15, 2025
CVE-2024-44313
8.1

CVE-2024-44313 is an incorrect access control vulnerability in TastyIgniter 3.7.6 that allows unauthorized users to access and generate invoices witho...

Mar 18, 2025
CVE-2025-2280
8.1

This vulnerability allows authenticated users in Devolutions Server to bypass browser extension restrictions, potentially enabling malicious browser e...

Mar 13, 2025
CVE-2025-25950
8.1

This vulnerability allows attackers to bypass access controls in Serosoft Academia SIS EagleR v1.0.118, enabling them to create and modify user accoun...

Mar 3, 2025
CVE-2024-12368
8.1

An improper access control vulnerability in Odoo's auth_oauth module allows internal users to export OAuth tokens belonging to other users. This affec...

Feb 25, 2025
CVE-2024-56883
8.1

Sage DPW versions before 2024_12_001 have an improper access control vulnerability where server-side role checks are inconsistently enforced. Low-priv...

Feb 18, 2025
CVE-2025-24411
8.1

Adobe Commerce has an improper access control vulnerability that allows low-privileged attackers to bypass security measures and gain unauthorized acc...

Feb 11, 2025
CVE-2025-24365
8.1

This vulnerability in vaultwarden allows an attacker who is an owner/admin of one organization to gain owner rights over another organization by knowi...

Jan 27, 2025
CVE-2025-0650
8.1

This vulnerability in Open Virtual Network (OVN) allows specially crafted UDP packets to bypass egress access control lists (ACLs), potentially enabli...

Jan 23, 2025
CVE-2024-48912
8.1

This vulnerability in GLPI allows authenticated users to delete any user account via a specific application endpoint. It affects GLPI versions 10.0.0 ...

Dec 11, 2024
CVE-2024-42514
8.1

An unauthenticated attacker can exploit inadequate access controls in Mitel MiContact Center Business's legacy chat component to access sensitive info...

Oct 1, 2024
CVE-2024-46097
8.1

TestLink 1.9.20 has an access control vulnerability in the TestPlan editing function that allows users with minimal privileges to view and modify all ...

Sep 27, 2024
CVE-2024-45170
8.1

CVE-2024-45170 is an improper access control vulnerability in za-internet C-MOR Video Surveillance software that allows low-privileged users to perfor...

Sep 4, 2024
CVE-2024-42480
8.1

Kamaji versions 1.0.0 and earlier have an RBAC misconfiguration that allows Kubernetes control plane API servers to access and manipulate data from ot...

Aug 12, 2024
CVE-2023-36554
8.1

This vulnerability allows attackers to execute arbitrary code or commands on Fortinet FortiManager devices through specially crafted HTTP requests due...

Mar 12, 2024
CVE-2024-0212
8.1

The Cloudflare WordPress plugin has an improper authentication vulnerability that allows attackers with lower-privileged WordPress accounts to access ...

Jan 29, 2024
CVE-2023-22618
8.1

This vulnerability in Nokia WaveLite products allows local users to create new administrative accounts by manipulating web requests when security hard...

Oct 4, 2023
CVE-2023-31242
8.1

This authentication bypass vulnerability in Open Automation Software OAS Platform allows attackers to gain unauthorized access by sending specially-cr...

Sep 5, 2023

About Improper Access Control (CWE-284)

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Our database tracks 1,302 CVEs classified as CWE-284, with 214 rated critical and 552 rated high severity. The average CVSS score for Improper Access Control vulnerabilities is 7.2.

External reference: View CWE-284 on MITRE CWE →

Monitor Improper Access Control Vulnerabilities

Get alerted when new Improper Access Control CVEs affect your infrastructure.

Start Monitoring Free