CWE-348

Use of Less Trusted Source
AI Translation Available

The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.

Status
draft
Abstraction
base

Common Consequences

access control
Impacts
bypass protection mechanism gain privileges or assume identity

Potential Mitigations