Cyber Posture

CWE · MITRE source

CWE-425Direct Request ('Forced Browsing')

Abstraction: Base · CVEs in our corpus: 223

The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.

Web applications susceptible to direct request attacks often make the false assumption that such resources can only be reached through a given navigation path and so only apply authorization at certain points in the path.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (6)AI

Showing the 5 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
AC-24Access Control DecisionsACForcing a decision on every access request, including direct ones, reduces the exploitability of forced browsing by ensuring no unchecked access paths.
AC-25Reference MonitorACForces all accesses through the reference monitor, preventing direct or forced requests that bypass checks.
AC-3Access EnforcementACEnforcing access for all logical requests prevents unauthorized direct access to protected resources.
SC-26DecoysSCDecoy endpoints catch forced browsing and direct requests, deflecting attackers from legitimate resources while enabling analysis.
SI-9Information Input RestrictionsSIBlocks unauthorized direct requests or forced browsing by denying input access to non-authorized actors.
Show 1 more broadly-applicable controls
AC-8System Use NotificationACDisplaying the notification before further access on public systems prevents direct resource requests from bypassing the required system use terms and consent.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2024-45195 KEV9.17.50.94152024-09-04
CVE-2021-26085 KEV8.75.30.93982021-08-03
CVE-2017-177367.59.80.92652018-03-23
CVE-2018-192077.59.80.91942018-11-12
CVE-2024-02047.59.80.93052024-01-22
CVE-2019-175036.55.30.90222019-10-11
CVE-2021-408756.57.50.83002021-09-22
CVE-2022-261596.35.30.87162022-02-28
CVE-2019-18985.85.30.78682019-06-20
CVE-2021-281505.85.50.78762021-05-06
CVE-2019-125835.49.10.59062019-06-27
CVE-2021-242155.29.80.54592021-04-12
CVE-2022-25515.17.50.59712022-08-22
CVE-2017-142445.09.80.50792017-09-17
CVE-2020-247654.77.50.53282020-10-20
CVE-2020-353914.79.60.46842021-01-01
CVE-2021-201144.77.50.53872021-07-30
CVE-2022-318474.57.50.50592022-06-14
CVE-2022-283654.45.30.56182022-04-09
CVE-2022-40573.85.30.45392023-01-02
CVE-2022-25443.67.50.34472022-08-22
CVE-2021-463783.57.50.33062022-03-04
CVE-2021-367453.19.80.18722021-09-29
CVE-2019-149273.07.50.25332019-10-28
CVE-2024-61883.05.30.32322024-06-20