Skip to main content
JG is here with you ✨
A01:2025

Broken Access Control

OWASP Top 10 - #1 Most Critical Web Security Risk

Critical Severity

What is Broken Access Control?

Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification, or destruction of data, or performing business functions outside the user's limits.

94% of applications tested3.81% incidence rate318k+ occurrences

IDOR

Insecure Direct Object Reference

Manipulating parameters to access unauthorized resources

Privilege Escalation

Vertical & Horizontal

Gaining elevated access beyond assigned permissions

Forced Browsing

Directory Traversal

Accessing unprotected pages by guessing URLs

CORS Misconfiguration

Cross-Origin Issues

Exploiting permissive cross-origin policies

JWT Manipulation

Token Attacks

Modifying tokens to change identity or permissions

SSRF

Server-Side Request Forgery

Making server fetch unauthorized internal resources

Related CWE Entries

Real-World Impact

Facebook (2019)Critical

IDOR exposed 540M user records

Uber (2016)Critical

Access control flaw exposed 57M users

Snapchat (2014)High

API abuse leaked 4.6M usernames

Parler (2021)Critical

Sequential IDs allowed mass data scraping

Built by an OWASP Member • Part of the OWASP Web Security Lab Series

Open to AI-Focused Roles

AI Sales • AI Strategy • AI Success • Creative Tech • Toronto / Remote

Let's connect →
Terms of ServiceLicense AgreementPrivacy Policy
Copyright © 2026 JMFG. All rights reserved.