Hi Researchers this is my 4rd Blog.
Press enter or click to view image in full size
During one of my bug bounty sessions, I came across a Horizontal Privilege Escalation vulnerability in a web application.
This bug allowed me to access another user’s account and even reset their password — without their permission.
In this post, I’ll walk you through how I approached the target, the steps I took, and how I finally exploited the bug.
Horizontal privilege escalation occurs when an attacker gains access to another user’s data or actions without having elevated privileges.
Unlike vertical privilege escalation (user → admin), horizontal escalation stays within the same permission level but jumps between accounts.
Example:
Before I found the bug, I performed my usual recon routine:
While exploring Account A, I navigated to:
My Account → Users → Settings
for a specific user.
I noticed that the URL or request contained a GUID (a unique User ID).
This looked something like:
/user/settings?id=23f9a9b1-xxxx-xxxx-xxxx-xxxxxxxxxxx
At this point, I suspected that if I replaced this GUID with another user’s ID, I might be able to access their data.