Vertical Privilege Escalation occurs when a user gains access to functionality or data that should be restricted to users with higher privileges, such as administrators. This typically involves bypassing role-based access controls.
The application fails to properly verify user roles before granting access to privileged functions. Attackers can directly access admin endpoints, manipulate role parameters, or exploit flaws in role validation logic.
// Regular user discovers admin endpoint
GET /admin/users -- Should be restricted!
// Role parameter manipulation
POST /user/update
{"username": "attacker", "role": "admin"}
// Hidden admin parameter
GET /settings?admin=true
// Accessing admin API directly
GET /api/admin/delete-user/123