This vulnerability occurs when an application allows users to directly modify critical system settings or configuration values from an external source.
When system settings like file paths, feature flags, or environment variables can be controlled by an external user, it breaks the fundamental trust between the application and its configuration. Attackers can exploit this to disrupt services, bypass security controls, or force the application to execute unintended and potentially malicious actions, leading to data loss or system compromise. Preventing this requires rigorous validation of all configuration inputs and enforcing strict separation between user data and system controls. While SAST tools can catch the pattern, Plexicus uses AI to analyze the data flow and suggest the precise code fix—such as implementing allowlists or moving configurations to secure, internal sources—saving hours of manual remediation work across your codebase.
Impact: Varies by Context
Strategy: Separation of Privilege
cjava