Role-Based Access Control (RBAC) is built to enforce rules and boundaries. It defines who can do what, and when. But those rules are only as strong as the people who follow them. Social engineering bypasses code. It targets trust, routine, and habit. Attackers know the sequence: identify the role, mimic the identity, trigger an action, exploit the access.
The weakness is not in the RBAC model itself. The weakness is in how roles are granted, reviewed, and revoked. Over-permissioned accounts give attackers more surface to hit. Poor audit patterns leave changes undiscovered. Inconsistent privilege reviews lead to dormant access that becomes attack gold.
A phishing email that persuades an admin to share credentials is social engineering. So is posing as a trusted colleague to request elevated permissions. Spear phishing, voice phishing, and malicious third-party requests are all proven ways to skirt RBAC gates. The target is not the ACL but the human who operates it.