Cyber Posture

CWE · MITRE source

CWE-552Files or Directories Accessible to External Parties

Abstraction: Base · CVEs in our corpus: 455

The product makes files or directories accessible to unauthorized actors, even though they should not be.

Web servers, FTP servers, and similar servers may store a set of files underneath a "root" directory that is accessible to the server's users. Applications may store sensitive files underneath this root without also using access control to limit which users may request those files, if any. Alternately, an application might package multiple files or directories into an archive file (e.g., ZIP or tar), but the application might not exclude sensitive files that are underneath those directories. In cloud technologies and containers, this weakness might present itself in the form of misconfigured storage accounts that can be read or written by a public or anonymous user.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (18)AI

Showing the 15 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
PM-1Information Security Program PlanPMExplicit protection requirements make it harder for the plan document to remain accessible to external parties or unauthorized spheres.
PM-17Protecting Controlled Unclassified Information on External SystemsPMProcedures ensure CUI files and resources are not made accessible to external parties without required protections.
PM-5System InventoryPMEnumerating systems surfaces externally reachable resources that would otherwise remain unmonitored and accessible.
CM-10Software Usage RestrictionsCMControlling and documenting P2P file sharing prevents files and directories from being made accessible to external parties for unauthorized distribution.
CM-12Information LocationCMIdentifying and documenting file and directory locations allows restriction of access to external parties.
MP-1Policy and ProceduresMPPolicy restricts media access to authorized parties only, preventing exposure of resources to external or unauthorized actors.
MP-2Media AccessMPMedia access restrictions prevent files or directories from being accessible to external parties.
PE-17Alternate Work SitePEEmploying and evaluating controls at documented alternate sites makes files and directories less likely to be accessible to external parties through physical or environmental weaknesses.
PE-3Physical Access ControlPEControls access to facility areas (including publicly accessible zones) to prevent external parties from reaching internal resources or sensitive locations.
SC-14Public Access ProtectionsSCPrevents public exposure of files or directories that should not be reachable by unauthenticated parties.
SC-26DecoysSCDecoy files and directories detect external access attempts and deflect attackers away from actual accessible resources.
AC-22Publicly Accessible ContentACControls on authorized publication limit files and directories with nonpublic data from becoming accessible to external parties.
CP-9System BackupCPProtecting backup files ensures they are not accessible to external parties or unauthorized spheres.
MA-2Controlled MaintenanceMASanitizing equipment before off-site maintenance reduces the risk of files or directories containing sensitive data becoming accessible to external parties.
RA-2Security CategorizationRACategorization results dictate which files and directories must be restricted, making unauthorized external access less likely.
Show 3 more broadly-applicable controls
SA-6Software Usage RestrictionsSAExplicit controls on peer-to-peer file sharing prevent files and directories from being made accessible to external parties without authorization.
SI-20TaintingSIDetects improper removal of data from files or directories that are accessible to external parties.
SR-7Supply Chain Operations SecuritySRControls ensure files and directories holding supply-chain data are not left accessible to unauthorized actors.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2020-17519 KEV9.27.50.94332021-01-05
CVE-2016-3715 KEV8.15.50.83602016-05-05
CVE-2025-11371 KEV7.77.50.70082025-10-09
CVE-2023-501647.59.80.92862023-12-07
CVE-2021-393167.17.50.93532021-08-31
CVE-2024-69117.17.50.93322024-07-22
CVE-2023-335686.97.50.89842023-06-13
CVE-2024-536766.79.80.79302024-11-27
CVE-2023-27666.65.30.91822023-05-17
CVE-2017-16651 KEV5.87.80.37272017-11-09
CVE-2022-06565.67.50.68162022-04-25
CVE-2020-243125.47.50.64992020-08-26
CVE-2024-48365.37.50.62932024-07-02
CVE-2023-61145.27.50.61262023-12-26
CVE-2021-401495.05.90.62952022-07-17
CVE-2022-413434.87.50.55422022-09-25
CVE-2024-62094.510.00.41622024-07-05
CVE-2022-443564.37.50.47062022-11-29
CVE-2020-151753.77.40.37192020-10-07
CVE-2021-257413.78.80.33042021-09-20
CVE-2021-401503.67.50.34232022-07-17
CVE-2025-48928 KEV3.34.00.08292025-05-28
CVE-2025-681093.39.10.25442025-12-17
CVE-2023-62663.17.50.26772024-01-11
CVE-2009-100053.00.00.49612025-08-20