CWE-345 - Insufficient Verification of Data Authenticity
Description
Because of improper verification of data origin or authenticity, software can receive invalid data.
The vulnerability is introduced during Architecture and Design, Implementation stages.