This vulnerability occurs when an application fetches and runs code from an external source—like a remote server or CDN—without properly verifying where it came from or ensuring it hasn't been tampered with.
Attackers exploit this weakness by hijacking the download process. They might compromise the server hosting the code, redirect your request via DNS spoofing, or alter the code as it travels over the network. Since the application blindly trusts and executes whatever it downloads, this allows the attacker to run their own malicious commands on your system. Detecting these insecure downloads manually across a large codebase is challenging. An ASPM platform like Plexicus can automatically identify these patterns via SAST/DAST scanning and, using AI, provide specific remediation guidance—such as implementing digital signatures or checksum verification—to fix the flaw efficiently.
Impact: Execute Unauthorized Code or CommandsAlter Execution LogicOther
Executing untrusted code could compromise the control flow of the program. The untrusted code could execute attacker-controlled commands, read or modify sensitive resources, or prevent the software from functioning correctly for legitimate users.
Strategy: Libraries or Frameworks
Strategy: Environment Hardening
Strategy: Sandbox or Jail
Effectiveness: Limited
java//assume the password is already encrypted, avoiding CWE-312*
php
phpMedium