A Trojan Horse vulnerability occurs when software presents itself as legitimate and useful, but secretly contains malicious functionality that bypasses security controls. This hidden code operates without the user's knowledge, violating the intended security policy of the system or its administrator.
This vulnerability exploits the trust relationship between users and software. Developers and users expect an application to perform only its advertised functions, but a Trojan Horse embeds additional, harmful actions within that trusted package. These hidden features might steal data, create backdoors, damage systems, or provide unauthorized access, all while the visible interface appears completely normal and benign. From a development perspective, this often stems from incorporating third-party components, libraries, or plugins without rigorous security review. It can also occur in supply chain attacks where build processes are compromised. To mitigate this risk, enforce strict code provenance controls, use software composition analysis tools to audit dependencies, and implement code signing with verification to ensure integrity from development through deployment.
Impact: Execute Unauthorized Code or Commands