SiteShadow
Back to vulnerability library

CWE-807 Reliance on Untrusted Inputs in a Security Decision

What this means

SiteShadow flagged a security decision being made using untrusted input (client-provided fields, headers, query params) without verification.

Why it matters

Trusting unverified input can enable bypasses and escalation.

Safer examples

1) Verify identity and roles server-side

Use server-validated sessions/tokens and load roles/permissions from the server.

2) Validate and allowlist inputs

Validate at the boundary and reject unexpected shapes (see CWE-20).

3) Recompute sensitive values server-side

Don't trust client totals/prices/state; recompute or verify with signatures (see A11).

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage