CWE-305

Authentication Bypass by Primary Weakness

Weakness Description

The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.

Common Consequences

Access Control
Bypass Protection Mechanism
Advertisement

Related Weaknesses