CWE-305
Authentication Bypass by Primary Weakness
AI Translation Available
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
Status
draft
Abstraction
base
Affected Platforms
Technical Details
AI Translation
Common Consequences
access control
Impacts
bypass protection mechanism