CWE-305

Authentication Bypass by Primary Weakness
AI Translation Available

The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.

Status
draft
Abstraction
base

Common Consequences

access control
Impacts
bypass protection mechanism

Potential Mitigations