OWASP TOP 10 / A01:2021
Broken Access Control
Failures that let users act outside their intended permissions — viewing, modifying, or deleting data they shouldn’t.
Broken access control moved to #1 in 2021 as the most common serious web risk. It includes insecure direct object references (IDOR), missing function-level checks, privilege escalation, and CORS misconfiguration.
Attackers simply change an ID, URL, or token to reach other users’ data or admin functions. Enforce access decisions server-side, deny by default, and never trust client-supplied identifiers.
Deny by default, enforce checks server-side on every request, use indirect object references, and log access-control failures.
Mapped weaknesses (CWE)
Free tools to test for it
Related terms
Part of the OWASP Top 10 reference. See also the CWE weaknesses and Web Security hub.