Broken Access Control
Broken access control vulnerabilities arise when an application fails to properly enforce restrictions on what authenticated users are allowed to do. Attackers can exploit broken access controls to gain unauthorized access to sensitive functions and data, such as viewing other users' private information or modifying data.