This vulnerability occurs when an application uses obfuscation or encryption to hide security-sensitive data (like tokens or parameters) but fails to verify whether that data has been altered. Without integrity checks, the system cannot detect if an attacker has tampered with these inputs.
Applications often hide or encrypt client-side data that influences server-side decisions, such as user permissions or system state. However, if the server only decodes or de-obfuscates this data without verifying its authenticity, an attacker can systematically guess or modify values to elevate privileges, access sensitive information, or alter application behavior. Obfuscation and weak encryption are designed for confidentiality, not integrity—they cannot prevent tampering. To prevent this, developers must implement robust integrity checks like digital signatures or HMACs alongside any obfuscation or encryption. These mechanisms allow the server to confirm that the data hasn't been changed since it was originally issued. Relying solely on hiding data is insufficient; you must actively validate its trustworthiness before using it for security-critical operations.
Impact: Unexpected State
The inputs could be modified without detection, causing the product to have unexpected system state or make incorrect security decisions.
High