The application allows external parties to modify its security boundaries or trusted zones, which should be defined and controlled internally.
A secure application defines its trusted operational zones—often called control spheres—within its own code or through secure administrator configuration. These zones determine what resources, data, and functions are considered internal and protected. The vulnerability occurs when an outside actor, such as an attacker or an unprivileged user, can alter these boundaries, effectively redrawing the security map of the application. This weakness is often a consequence of other flaws, like insecure configuration storage, missing access controls on critical settings, or excessive trust in user-supplied data that defines system behavior. When external influence is possible, attackers can shrink or expand these trust zones to bypass security checks, access restricted data, or escalate privileges, fundamentally undermining the application's intended security model.
Impact: Other