This vulnerability occurs when an authentication system incorrectly treats certain data as unchangeable, when in fact an attacker can manipulate it to bypass login or verification checks.
Developers often assume that specific data points, like hidden form fields, environment variables, or certain HTTP headers, are secure and cannot be altered by a user. However, attackers can intercept and modify this 'assumed-immutable' data during transit or exploit client-side controls, tricking the application into granting unauthorized access. To prevent this, never trust client-side data for critical security decisions. Always re-validate authentication state and user permissions on the server using a trusted, server-controlled session mechanism. Treat all data from the client—including cookies, headers, and hidden parameters—as potentially malicious and subject to verification against the authoritative server-side session store.
Impact: Bypass Protection Mechanism
java