Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-34778

Summary
Assigner-GitHub_M
Assigner Org ID-a0819718-46f1-4df5-94e2-005712e83aaa
Published At-03 Apr, 2026 | 23:59
Updated At-06 Apr, 2026 | 15:50
Rejected At-
Credits

Electron: Service worker can spoof executeJavaScript IPC replies

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, a service worker running in a session could spoof reply messages on the internal IPC channel used by webContents.executeJavaScript() and related methods, causing the main-process promise to resolve with attacker-controlled data. Apps are only affected if they have service workers registered and use the result of webContents.executeJavaScript() (or webFrameMain.executeJavaScript()) in security-sensitive decisions. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:GitHub_M
Assigner Org ID:a0819718-46f1-4df5-94e2-005712e83aaa
Published At:03 Apr, 2026 | 23:59
Updated At:06 Apr, 2026 | 15:50
Rejected At:
▼CVE Numbering Authority (CNA)
Electron: Service worker can spoof executeJavaScript IPC replies

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, a service worker running in a session could spoof reply messages on the internal IPC channel used by webContents.executeJavaScript() and related methods, causing the main-process promise to resolve with attacker-controlled data. Apps are only affected if they have service workers registered and use the result of webContents.executeJavaScript() (or webFrameMain.executeJavaScript()) in security-sensitive decisions. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0.

Affected Products
Vendor
Electron Userlandelectron
Product
electron
Versions
Affected
  • < 38.8.6
  • >= 39.0.0-alpha.1, < 39.8.1
  • >= 40.0.0-alpha.1, < 40.8.1
  • >= 41.0.0-alpha.1, < 41.0.0
Problem Types
TypeCWE IDDescription
CWECWE-290CWE-290: Authentication Bypass by Spoofing
CWECWE-345CWE-345: Insufficient Verification of Data Authenticity
Type: CWE
CWE ID: CWE-290
Description: CWE-290: Authentication Bypass by Spoofing
Type: CWE
CWE ID: CWE-345
Description: CWE-345: Insufficient Verification of Data Authenticity
Metrics
VersionBase scoreBase severityVector
3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/electron/electron/security/advisories/GHSA-xj5x-m3f3-5x3h
x_refsource_CONFIRM
Hyperlink: https://github.com/electron/electron/security/advisories/GHSA-xj5x-m3f3-5x3h
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security-advisories@github.com
Published At:04 Apr, 2026 | 00:16
Updated At:20 Apr, 2026 | 14:22

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0, a service worker running in a session could spoof reply messages on the internal IPC channel used by webContents.executeJavaScript() and related methods, causing the main-process promise to resolve with attacker-controlled data. Apps are only affected if they have service workers registered and use the result of webContents.executeJavaScript() (or webFrameMain.executeJavaScript()) in security-sensitive decisions. This issue has been patched in versions 38.8.6, 39.8.1, 40.8.1, and 41.0.0.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.9MEDIUM
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N
Primary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 5.9
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N
Type: Primary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CPE Matches

Electron (OpenJS Foundation)
electronjs
>>electron>>Versions before 38.8.6(exclusive)
cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>Versions from 39.0.0(inclusive) to 39.8.1(exclusive)
cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>Versions from 40.0.0(inclusive) to 40.8.1(exclusive)
cpe:2.3:a:electronjs:electron:*:*:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:alpha1:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:alpha2:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:alpha3:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:alpha4:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:alpha5:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:alpha6:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta1:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta2:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta3:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta4:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta5:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta6:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta7:*:*:*:node.js:*:*
Electron (OpenJS Foundation)
electronjs
>>electron>>41.0.0
cpe:2.3:a:electronjs:electron:41.0.0:beta8:*:*:*:node.js:*:*
Weaknesses
CWE IDTypeSource
CWE-290Primarysecurity-advisories@github.com
CWE-345Primarysecurity-advisories@github.com
CWE ID: CWE-290
Type: Primary
Source: security-advisories@github.com
CWE ID: CWE-345
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/electron/electron/security/advisories/GHSA-xj5x-m3f3-5x3hsecurity-advisories@github.com
Vendor Advisory
Hyperlink: https://github.com/electron/electron/security/advisories/GHSA-xj5x-m3f3-5x3h
Source: security-advisories@github.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

13Records found

CVE-2023-44402
Matching Score-6
Assigner-GitHub, Inc.
ShareView Details
Matching Score-6
Assigner-GitHub, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.11% / 29.63%
||
7 Day CHG~0.00%
Published-01 Dec, 2023 | 21:45
Updated-02 Aug, 2024 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ASAR Integrity bypass via filetype confusion in electron

Electron is an open source framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. This only impacts apps that have the `embeddedAsarIntegrityValidation` and `onlyLoadAppFromAsar` fuses enabled. Apps without these fuses enabled are not impacted. This issue is specific to macOS as these fuses are only currently supported on macOS. Specifically this issue can only be exploited if your app is launched from a filesystem the attacker has write access too. i.e. the ability to edit files inside the `.app` bundle on macOS which these fuses are supposed to protect against. There are no app side workarounds, you must update to a patched version of Electron.

Action-Not Available
Vendor-Electron UserlandElectron (OpenJS Foundation)
Product-electronelectron
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2026-6967
Matching Score-4
Assigner-Amazon
ShareView Details
Matching Score-4
Assigner-Amazon
CVSS Score-7.1||HIGH
EPSS-0.02% / 6.11%
||
7 Day CHG-0.01%
Published-24 Apr, 2026 | 19:41
Updated-06 May, 2026 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Delegated Metadata Validation in awslabs/tough

Missing expiration, hash, and length enforcement in delegated metadata validation in awslabs/tough before tough-v0.22.0 allows remote authenticated users with delegated signing authority to bypass TUF specification integrity checks for delegated targets metadata and poison the local metadata cache, because load_delegations does not apply the same validation checks as the top-level targets metadata path. We recommend you upgrade to tough-v0.22.0 / tuftool-v0.15.0.

Action-Not Available
Vendor-amazonAWS
Product-toughtuftooltoughtuftool
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2026-39366
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.02% / 5.06%
||
7 Day CHG~0.00%
Published-07 Apr, 2026 | 19:21
Updated-22 Apr, 2026 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WWBN AVideo Affected by a PayPal IPN Replay Attack Enabling Wallet Balance Inflation via Missing Transaction Deduplication in ipn.php

WWBN AVideo is an open source video platform. In versions 26.0 and prior, the PayPal IPN v1 handler at plugin/PayPalYPT/ipn.php lacks transaction deduplication, allowing an attacker to replay a single legitimate IPN notification to repeatedly inflate their wallet balance and renew subscriptions. The newer ipnV2.php and webhook.php handlers correctly deduplicate via PayPalYPT_log entries, but the v1 handler was never updated and remains actively referenced as the notify_url for billing plans.

Action-Not Available
Vendor-wwbnWWBN
Product-avideoAVideo
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2026-35622
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-6||MEDIUM
EPSS-0.07% / 22.33%
||
7 Day CHG+0.01%
Published-09 Apr, 2026 | 21:26
Updated-17 Apr, 2026 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenClaw < 2026.3.22 - Improper Authentication Verification in Google Chat Webhook

OpenClaw before 2026.3.22 contains an improper authentication verification vulnerability in Google Chat app-url webhook handling that accepts add-on principals outside intended deployment bindings. Attackers can bypass webhook authentication by providing non-deployment add-on principals to execute unauthorized actions through the Google Chat integration.

Action-Not Available
Vendor-OpenClaw
Product-openclawOpenClaw
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2022-29220
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.08% / 23.86%
||
7 Day CHG~0.00%
Published-31 May, 2022 | 16:10
Updated-23 Apr, 2025 | 18:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
No verification of commits origin in github-action-merge-dependabot

github-action-merge-dependabot is an action that automatically approves and merges dependabot pull requests (PRs). Prior to version 3.2.0, github-action-merge-dependabot does not check if a commit created by dependabot is verified with the proper GPG key. There is just a check if the actor is set to `dependabot[bot]` to determine if the PR is a legit PR. Theoretically, an owner of a seemingly valid and legit action in the pipeline can check if the PR is created by dependabot and if their own action has enough permissions to modify the PR in the pipeline. If so, they can modify the PR by adding a second seemingly valid and legit commit to the PR, as they can set arbitrarily the username and email in for commits in git. Because the bot only checks if the actor is valid, it would pass the malicious changes through and merge the PR automatically, without getting noticed by project maintainers. It would probably not be possible to determine where the malicious commit came from, as it would only say `dependabot[bot]` and the corresponding email-address. Version 3.2.0 contains a patch for this issue.

Action-Not Available
Vendor-fastifyfastify
Product-github_action_merge_dependabotgithub-action-merge-dependabot
CWE ID-CWE-283
Unverified Ownership
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2019-5587
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.10% / 27.69%
||
7 Day CHG~0.00%
Published-04 Jun, 2019 | 21:35
Updated-25 Oct, 2024 | 14:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lack of root file system integrity checking in Fortinet FortiOS VM application images all versions below 6.0.5 may allow attacker to implant malicious programs into the installing image by reassembling the image through specific methods.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortiosFortinet FortiOS
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2023-0350
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.5||MEDIUM
EPSS-0.08% / 22.86%
||
7 Day CHG~0.00%
Published-13 Mar, 2023 | 20:22
Updated-16 Jan, 2025 | 21:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-0350

Akuvox E11 does not ensure that a file extension is associated with the file provided. This could allow an attacker to upload a file to the device by changing the extension of a malicious file to an accepted file type.

Action-Not Available
Vendor-Akuvox (SMART-PLUS PTE. LTD.)
Product-e11e11_firmwareE11
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2022-3820
Matching Score-4
Assigner-GitLab Inc.
ShareView Details
Matching Score-4
Assigner-GitLab Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.12% / 29.92%
||
7 Day CHG~0.00%
Published-24 Jan, 2023 | 00:00
Updated-02 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue has been discovered in GitLab affecting all versions starting from 15.4 prior to 15.4.4, and 15.5 prior to 15.5.2. GitLab was not performing correct authentication with some Package Registries when IP address restrictions were configured, allowing an attacker already in possession of a valid Deploy Token to misuse it from any location.

Action-Not Available
Vendor-GitLab Inc.
Product-gitlabGitLab
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2022-37928
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-8||HIGH
EPSS-0.14% / 33.62%
||
7 Day CHG~0.00%
Published-03 Nov, 2022 | 15:51
Updated-02 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient Verification of Data Authenticity vulnerability in Hewlett Packard Enterprise HPE Nimble Storage Hybrid Flash Arrays and Nimble Storage Secondary Flash Arrays.

Action-Not Available
Vendor-Hewlett Packard Enterprise (HPE)
Product-hf20chf60_firmwaresf100sf100_firmwarehf40_firmwarehf20_firmwarehf60c_firmwaresf300hf40c_firmwarehf20c_firmwarehf40hf20hhf20sf300_firmwarehf60hf40chf60chf20h_firmwareHPE Nimble Storage Hybrid Flash Arrays; Nimble Storage Secondary Flash Arrays
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2021-32631
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.25% / 48.60%
||
7 Day CHG~0.00%
Published-26 Jul, 2021 | 15:20
Updated-03 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JSON Web Tokens not properly verified

Common is a package of common modules that can be accessed by NIMBLE services. Common before commit number 3b96cb0293d3443b870351945f41d7d55cb34b53 did not properly verify the signature of JSON Web Tokens. This allows someone to forge a valid JWT. Being able to forge JWTs may lead to authentication bypasses. Commit number 3b96cb0293d3443b870351945f41d7d55cb34b53 contains a patch for the issue. As a workaround, one may use the parseClaimsJws method to correctly verify the signature of a JWT.

Action-Not Available
Vendor-nimble-projectnimble-platform
Product-commoncommon
CWE ID-CWE-290
Authentication Bypass by Spoofing
CVE-2021-32665
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.8||HIGH
EPSS-0.12% / 30.97%
||
7 Day CHG~0.00%
Published-03 Jun, 2021 | 21:00
Updated-03 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Verified groups not reliable

wire-ios is the iOS version of Wire, an open-source secure messaging app. wire-ios versions 3.8.0 and earlier have a bug in which a conversation could be incorrectly set to "unverified. This occurs when: - Self user is added to a new conversation - Self user is added to an existing conversation - All the participants in the conversation were previously marked as verified. The vulnerability is patched in wire-ios version 3.8.1. As a workaround, one can unverify & verify a device in the conversation.

Action-Not Available
Vendor-wirewireapp
Product-wirewire-ios
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2021-41087
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.6||MEDIUM
EPSS-0.30% / 53.19%
||
7 Day CHG~0.00%
Published-21 Sep, 2021 | 21:05
Updated-04 Aug, 2024 | 02:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improperly Implemented path matching for in-toto-golang

in-toto-golang is a go implementation of the in-toto framework to protect software supply chain integrity. In affected versions authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo). Exploiting this vulnerability is dependent on the specific policy applied. The problem has been fixed in version 0.3.0.

Action-Not Available
Vendor-in-totoin-toto
Product-in-toto-golangin-toto-golang
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-48469
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 21.35%
||
7 Day CHG~0.00%
Published-16 Jun, 2023 | 12:59
Updated-17 Dec, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a traffic hijacking vulnerability in Huawei routers. Successful exploitation of this vulnerability can cause packets to be hijacked by attackers. 

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-b535-232a_firmwareb535-232aB535-232a
CWE ID-CWE-290
Authentication Bypass by Spoofing
Details not found