This vulnerability occurs when an application switches between different security contexts (like privilege levels or domains) using a series of steps that can be interrupted. An attacker can exploit the timing gap during this switch to trick the application into performing actions with the wrong permissions or resources.
This flaw is a classic race condition that targets the brief window when an application is changing states, such as moving from a trusted admin area to a public user space. Because the switch isn't performed as a single, uninterruptible operation, an attacker can inject malicious actions that get executed with the privileges of the previous, more trusted context. In practice, this is frequently seen in web browsers. For example, if a user navigates from a secure banking site to an untrusted forum, there's a moment during the page transition where scripts might still run with the origin or permissions of the banking site. An attacker could exploit this to access sensitive data or perform unauthorized actions that should have been blocked after the context change.
Impact: Modify Application DataRead Application Data