# Insecure Direct Object References > Insecure Direct Object References (IDOR) is a security vulnerability that occurs when an application allows users to directly access or modify objects (such as files, database records, or URLs) based on user-supplied input, without sufficient access controls. This means that if a user changes a parameter value (like an ID) in a URL or API request, they might be able to access or manipulate data that they aren’t authorized to see or modify. ## Summary * [Tools](#tools) * [Methodology](#methodology) * [Numeric Value Parameter](#numeric-value-parameter) * [Common Identifiers Parameter](#common-identifiers-parameter) * [Weak Pseudo Random Number Generator](#weak-pseudo-random-number-generator) * [Hashed Parameter](#hashed-parameter) * [Wildcard Parameter](#wildcard-parameter) * [IDOR Tips](#idor-tips) * [Labs](#labs) * [References](#references) ## Tools - [PortSwigger/BApp Store > Authz](https://portswigger.net/bappstore/4316cc18ac5f434884b2089831c7d19e) - [PortSwigger/BApp Store > AuthMatrix](https://portswigger.net/bappstore/30d8ee9f40c041b0bfec67441aad158e) - [PortSwigger/BApp Store > Autorize](https://portswigger.net/bappstore/f9bbac8c4acf4aefa4d7dc92a991af2f) ## Methodology IDOR stands for Insecure Direct Object Reference. It's a type of security vulnerability that arises when an application provides direct access to objects based on user-supplied input. As a result, attackers can bypass authorization and access resources in the system directly, potentially leading to unauthorized information disclosure, modification, or deletion. **Example of IDOR** Imagine a web application that allows users to view their profile by clicking a link `https://example.com/profile?user_id=123`: ```php