This vulnerability occurs when a web application incorrectly trusts data that appears to be fixed or hidden from the user, such as values in hidden form fields, cookies, or URL parameters. Because this data is actually controllable by the client, attackers can modify it to bypass security checks or corrupt application logic.
Web applications often make a critical mistake: they assume that data sent to the client in hidden fields, cookies, or parameters will be returned unchanged. Since all client-side data can be tampered with, this false sense of security leads to improper validation. Attackers exploit this by modifying these assumed-immutable values to escalate privileges, manipulate prices, alter user sessions, or corrupt backend data flows. The core issue is the server's over-reliance on client-provided data for making security decisions. To prevent this, always validate and authorize all user input on the server, regardless of its perceived source or immutability. Treat hidden fields and cookies as untrusted input, just like any other form field. Implementing proper server-side session management and using cryptographic signatures for critical data can help enforce integrity. Managing these validation rules across a complex application is challenging; an ASPM platform like Plexicus can automatically detect these trust violations via DAST and SAST, and its AI can suggest precise code fixes to enforce server-side validation, streamlining remediation.
Impact: Modify Application Data
Without appropriate protection mechanisms, the client can easily tamper with cookies and similar web data. Reliance on the cookies without detailed validation can lead to problems such as SQL injection. If you use cookie values for security related decisions on the server side, manipulating the cookies might lead to violations of security policies such as authentication bypassing, user impersonation and privilege escalation. In addition, storing sensitive data in the cookie without appropriate protection can also lead to disclosure of sensitive user data, especially data stored in persistent cookies.
Strategy: Input Validation
Strategy: Input Validation
javahtml