"Imagine you sign up as a normal user…and two minutes later you're editing the admin's settings without ever touching their password." That moment is called privilege escalation — and it's where many "meh" bugs quietly turn into real money.
What Is Privilege Escalation?
Privilege escalation is just climbing the access ladder:
- Vertical: user → admin, read‑only → read/write, web user → server root.
- Horizontal: same level, but into someone else's data (User A sees/edits User B).
Why it matters:
- It turns small bugs (IDOR, weak checks, misconfigs) into:
- Account takeover
- Org‑wide compromise
- Full system pwn
🌐 Web / Bug Bounty Priv‑Esc: Fast Playbook
Log in as a low‑privileged account and think: "Can I act like an admin or another user if I just change the data I send?"
1. Attack the IDs
- Tweak IDs in URLs/body:
user_id,account_id,org_id,team_id,project_id,invoice_id- If your
id=100, tryid=101,id=1, etc. - If you can read/change others' resources → access control/privilege escalation.
2. Replay Admin Requests
- Capture an admin‑only action (role change, user management, billing).
- Swap in your normal user cookies and replay the exact same request.
- If it still succeeds → missing server‑side role check.
3. Ignore the UI, Hit the API
- Hunt endpoints like
/admin/*,/internal/*,/manage/*,/settings/*. - Even if the button is hidden, call the endpoint directly as a normal user.
- Working calls here = vertical privilege escalation.
4. Break Tenant Boundaries
- In multi‑tenant apps, flip org/workspace IDs:
/org/1/users→/org/2/users- Seeing or editing another org's data is a high‑impact escalation.
5. Abuse "Temporary" Elevation
- Features to watch:
- Invites (workspaces, orgs, teams)
- "Act as user" / impersonation tools
- OAuth apps with broad scopes
- Try:
- Reusing invite/impersonation links
- Keeping access after removal/demotion
- Using tokens in places they weren't meant for
🧾 Pocket Checklist (Drop into Your Notes)
- Change resource IDs and org IDs.
- Replay admin actions with low‑priv cookies.
- Call hidden
/admin//manageendpoints directly. - Abuse invite, impersonation, and OAuth flows.
- Check if old sessions/tokens still have high privileges after demotion.
Privilege escalation isn't about fancy payloads; it's about thinking, "What if I simply refuse to stay in my assigned lane, and the app lets me?"