VYPR

CWE-284

Improper Access Control

PillarIncomplete

Description

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

Hierarchy (View 1000)

Related attack patterns (CAPEC)

CAPEC-19 · CAPEC-441 · CAPEC-478 · CAPEC-479 · CAPEC-502 · CAPEC-503 · CAPEC-536 · CAPEC-546 · CAPEC-550 · CAPEC-551 · CAPEC-552 · CAPEC-556 · CAPEC-558 · CAPEC-562 · CAPEC-563 · CAPEC-564 · CAPEC-578

CVEs mapped to this weakness (1,923)

page 27 of 97
  • CVE-2025-61115HigOct 30, 2025
    risk 0.49cvss 7.5epss 0.00

    ABC Fine Wine & Spirits Android App version v.11.27.5 and before (package name com.cta.abcfinewineandspirits), developed by ABC Liquors, Inc., contains an improper access control vulnerability in its login mechanism. The application does not properly validate user passwords during authentication, allowing attackers to bypass login checks and obtain valid session identifiers. Successful exploitation could result in unauthorized account access, privacy breaches, and misuse of the platform.

  • CVE-2025-61113HigOct 30, 2025
    risk 0.49cvss 7.5epss 0.00

    TalkTalk 3.3.6 Android App contains improper access control vulnerabilities in multiple API endpoints. By modifying request parameters, attackers may obtain sensitive user information (such as device identifiers and birthdays) and access private group information, including join credentials. Successful exploitation may result in privacy breaches and unauthorized access to restricted resources.

  • CVE-2025-61234HigOct 29, 2025
    risk 0.49cvss 7.5epss 0.00

    Incorrect access control on Dataphone A920 v2025.07.161103 exposes a service on port 8888 by default on the local network without authentication. This allows an attacker to interact with the device via a TCP socket without credentials. Additionally, sending an HTTP request to the service on port 8888 triggers an error in the response, which exposes the functionality, headers identifying Paytef dataphone packets, and the build version.

  • CVE-2025-60354HigOct 28, 2025
    risk 0.49cvss 7.5epss 0.00

    Unauthorized modification of arbitrary articles vulnerability exists in blog-vue-springboot.

  • CVE-2025-56241HigSep 24, 2025
    risk 0.49cvss 7.5epss 0.00

    Aztech DSL5005EN firmware 1.00.AZ_2013-05-10 and possibly other versions allows unauthenticated attackers to change the administrator password via a crafted POST request to sysAccess.asp. This allows full administrative control of the router without authentication.

  • CVE-2025-37125HigSep 16, 2025
    risk 0.49cvss 7.5epss 0.00

    A broken access control vulnerability exists in HPE Aruba Networking EdgeConnect OS (ECOS). Successful exploitation could allow an attacker to bypass firewall protections, potentially leading to unauthorized traffic being handled improperly

  • CVE-2025-56406HigSep 10, 2025
    risk 0.49cvss 7.5epss 0.00

    An issue was discovered in mcp-neo4j 0.3.0 allowing attackers to obtain sensitive information or execute arbitrary commands via the SSE service. NOTE: the Supplier's position is that authentication is not mandatory for MCP servers, and the mcp-neo4j MCP server is only intended for use in a local environment where authentication realistically would not be needed. Also, the Supplier provides middleware to help isolate the MCP server from external access (if needed).

  • CVE-2024-53494HigAug 22, 2025
    risk 0.49cvss 7.5epss 0.00

    Incorrect access control in the preHandle function of SpringBootBlog v1.0.0 allows attackers to access sensitive components without authentication.

  • CVE-2025-20100HigMay 13, 2025
    risk 0.49cvss 7.5epss 0.00

    Improper access control in the memory controller configurations for some Intel(R) Xeon(R) 6 processor with E-cores may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2025-31247HigMay 12, 2025
    risk 0.49cvss 7.5epss 0.00

    A logic issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6. An attacker may gain access to protected parts of the file system.

  • CVE-2025-32470HigApr 28, 2025
    risk 0.49cvss 7.5epss 0.01

    A remote unauthenticated attacker may be able to change the IP adress of the device, and therefore affecting the availability of the device.

  • CVE-2025-25381HigMar 6, 2025
    risk 0.49cvss 7.5epss 0.00

    Incorrect access control in the KSRTC AWATAR app of Karnataka State Road Transport Corporation v1.3.0 allows to view sensitive information such as usernames and passwords.

  • CVE-2025-24885HigJan 30, 2025
    risk 0.49cvss 7.6epss 0.00

    pwn.college is an education platform to learn about, and practice, core cybersecurity concepts in a hands-on fashion. Missing access control on rendering custom (unprivileged) dojo pages causes ability for users to create stored XSS.

  • CVE-2024-50945HigDec 27, 2024
    risk 0.49cvss 7.5epss 0.05

    An improper access control vulnerability exists in SimplCommerce at commit 230310c8d7a0408569b292c5a805c459d47a1d8f, allowing users to submit reviews without verifying if they have purchased the product.

  • CVE-2023-43626HigSep 16, 2024
    risk 0.49cvss 7.5epss 0.00

    Improper access control in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2023-30587HigSep 7, 2024
    risk 0.49cvss 7.5epss 0.00

    A vulnerability in Node.js version 20 allows for bypassing restrictions set by the --experimental-permission flag using the built-in inspector module (node:inspector). By exploiting the Worker class's ability to create an "internal worker" with the kIsInternal Symbol, attackers can modify the isInternal value when an inspector is attached within the Worker constructor before initializing a new WorkerImpl. This vulnerability exclusively affects Node.js users employing the permission model mechanism. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

  • CVE-2023-30583HigSep 7, 2024
    risk 0.49cvss 7.5epss 0.00

    fs.openAsBlob() can bypass the experimental permission model when using the file system read restriction with the `--allow-fs-read` flag in Node.js 20. This flaw arises from a missing check in the `fs.openAsBlob()` API. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.

  • CVE-2024-36443HigAug 22, 2024
    risk 0.49cvss 7.6epss 0.00

    Swissphone DiCal-RED 4009 devices allow a remote attacker to gain read access to almost the whole file system via anonymous FTP.

  • CVE-2024-40786HigJul 29, 2024
    risk 0.49cvss 7.5epss 0.00

    This issue was addressed through improved state management. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, iOS 17.6 and iPadOS 17.6, macOS Ventura 13.6.8. An attacker may be able to view sensitive user information.

  • CVE-2024-39697HigJul 9, 2024
    risk 0.49cvss 8.6epss 0.00

    phonenumber is a library for parsing, formatting and validating international phone numbers. Since 0.3.4, the phonenumber parsing code may panic due to a panic-guarded out-of-bounds access on the phonenumber string. In a typical deployment of rust-phonenumber, this may get triggered by feeding a maliciously crafted phonenumber, e.g. over the network, specifically strings of the form `+dwPAA;phone-context=AA`, where the "number" part potentially parses as a number larger than 2^56. This vulnerability is fixed in 0.3.6.