CWE-305: Authentication Bypass by Primary Weakness
BaseDraft
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
View on MITREBack to CWE Lookup
Technical Details
- Structure
- Simple
Applicable To
Not Language-Specific