CWE-302

Authentication Bypass by Assumed-Immutable Data

Weakness Description

The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.

Potential Mitigations

Architecture and DesignOperationImplementation

Implement proper protection for immutable data (e.g. environment variable, hidden form fields, etc.)

Common Consequences

Access Control
Bypass Protection Mechanism
Advertisement

Related Weaknesses