Vulnerabilities due to open permissions occur when overly permissive access controls are applied to files, directories, databases, or other resources. Open permissions can allow unauthorized users or malicious actors to access, modify, or delete sensitive data or execute unauthorized actions. This can lead to data breaches, privilege escalation, or unauthorized system manipulation.