Vulnerabilities
Broken Access Control
Also known as: BAC, Authorization bypass
Definition
A class of vulnerabilities where authorization rules are missing or incorrectly enforced, letting users perform actions or reach data outside their privileges.
Examples
- A normal user calling /api/admin/users without role checks and receiving full lists.
- Changing a document UUID in the URL and reading another customer's invoice.
Related terms
Insecure Direct Object Reference (IDOR)
An access-control flaw where an application exposes references to internal objects and lets a user change them to access data that does not belong to them.
Horizontal Privilege Escalation
A flaw that lets a user access resources or actions of another user with the same privilege level rather than gaining higher rights.
Vertical Privilege Escalation
A flaw that lets a low-privileged user obtain higher-privileged rights — typically administrator, root, or SYSTEM.
Broken Authentication
A category of vulnerabilities where flaws in authentication or session management let attackers impersonate legitimate users or take over accounts.
OWASP Top 10
OWASP Top 10 — definition coming soon.
Principle of Least Privilege
A security principle that grants every user, process, or service only the minimum privileges strictly required to perform its function — no more.