Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

Escalation

The process of gaining higher-level privileges or broader access than originally authorized within a system.

Privilege escalation is the act of exploiting a vulnerability, design flaw, or misconfiguration to gain elevated access within a system. It allows an attacker to move from a low-privilege context to one with greater permissions, ultimately accessing data or functionality they were never intended to reach.

How It Works

Escalation comes in two forms: vertical and horizontal. Vertical escalation means gaining higher privileges than your current role permits. A regular user accessing admin functionality is a classic example. This can happen when the application only hides admin UI elements in the frontend but fails to enforce authorization checks on the backend. An attacker who discovers the admin API endpoints can call them directly, bypassing the interface restrictions entirely.

Horizontal escalation involves accessing resources belonging to another user at the same privilege level. For instance, if a user can view their own invoices at /api/invoices/1234, changing the ID to /api/invoices/1235 might return another user's invoice if the server does not verify ownership. This is closely related to Insecure Direct Object Reference (IDOR) vulnerabilities.

Escalation chains are particularly dangerous. An attacker might start with an information disclosure vulnerability to learn internal user IDs, use those IDs to exploit an IDOR for horizontal access, then leverage a business logic flaw to assign themselves an admin role. Each step individually might seem minor, but the chain leads to full account takeover or system compromise.

Why It Matters

Escalation vulnerabilities are consistently ranked among the most impactful findings in security assessments. They directly undermine the trust model of an application. A system might have perfect input validation and strong encryption, but if a regular user can promote themselves to admin through a parameter manipulation, none of those other controls matter.

Preventing escalation requires enforcing authorization checks on every server-side action, validating that the authenticated user owns the requested resource, and implementing the principle of least privilege throughout the application stack.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment