This weakness occurs when an application bypasses its dedicated, central data manager component and performs data access operations through other code paths.
When developers create a central data manager, they typically optimize it for performance, security, and consistency. Bypassing this component forces the application to use less efficient, unoptimized data access methods, which can degrade performance and introduce inconsistencies in how data is handled. This performance degradation isn't just a maintenance issue—it can become a security vulnerability. If an attacker can trigger these inefficient bypass paths, they might cause resource exhaustion, denial of service, or exploit inconsistencies that the central manager was designed to prevent.
Impact: Reduce Performance