This vulnerability occurs when an application fails to properly secure access to code resources that can be created or altered at runtime, such as variables, functions, or objects.
Many modern programming languages provide powerful features for dynamic code manipulation, allowing developers to generate or modify code, objects, and functions while the application is running. While these capabilities offer great flexibility and can speed up development, they introduce significant risk if an attacker can influence what gets created or changed. Without strict controls, an attacker could inject malicious logic, alter critical data structures, or bypass security checks by manipulating these dynamic resources. To prevent this, developers must implement strong validation, enforce strict access controls, and avoid using user input directly in dynamic code operations.
Impact: Execute Unauthorized Code or Commands
Impact: Varies by ContextAlter Execution Logic
Strategy: Input Validation
Strategy: Refactoring