This vulnerability occurs when an application checks if a user is allowed to perform an action or access data, but the check is flawed or incomplete, allowing unauthorized access.

Incorrect authorization happens when the logic that verifies user permissions contains mistakes. For example, the app might check a user's role but forget to verify if they own the specific data they're trying to modify, leading to horizontal privilege escalation. It can also stem from missing checks entirely for certain application paths, or from relying on client-side controls that attackers can easily bypass. These flaws are often subtle and context-dependent, making them hard to catch in code reviews. While SAST tools can identify missing authorization patterns, Plexicus uses AI to analyze the specific business logic and suggest precise code fixes, helping developers close these security gaps efficiently and prevent data breaches.
Impact: Read Application DataRead Files or Directories
An attacker could bypass intended access restrictions to read sensitive data, either by reading the data directly from a data store that is not correctly restricted, or by accessing insufficiently-protected, privileged functionality to read the data.
Impact: Modify Application DataModify Files or Directories
An attacker could bypass intended access restrictions to modify sensitive data, either by writing the data directly to a data store that is not correctly restricted, or by accessing insufficiently-protected, privileged functionality to write the data.
Impact: Gain Privileges or Assume IdentityBypass Protection Mechanism
An attacker could bypass intended access restrictions to gain privileges by modifying or reading critical data directly, or by accessing privileged functionality.
Impact: Execute Unauthorized Code or Commands
An attacker could use elevated privileges to execute unauthorized commands or code.
Impact: DoS: Crash, Exit, or RestartDoS: Resource Consumption (CPU)DoS: Resource Consumption (Memory)DoS: Resource Consumption (Other)
An attacker could gain unauthorized access to resources on the system and excessively consume those resources, leading to a denial of service.
Strategy: Libraries or Frameworks
phpHigh