This vulnerability occurs when a system's core authentication logic is technically correct, but an attacker can completely bypass it by exploiting a separate, more fundamental flaw in the application.
Think of this as a strong lock on a weak door. The authentication mechanism itself isn't broken, but a critical oversight elsewhere—like an unprotected alternative login path, a logic flaw in session handling, or misconfigured security controls—provides a direct route around it. Attackers target these primary weaknesses first, rendering the robust authentication process irrelevant because they never have to pass through it. For developers, this means security auditing must look beyond just the login function. You must examine the entire authentication flow, including password reset endpoints, API tokens, session validation, and any hidden administrative interfaces. The fix involves identifying and securing that primary entry point, ensuring all access paths enforce the same rigorous checks as your main login system.
Impact: Bypass Protection Mechanism