Description
In a language where the user can influence the name of a variable at runtime, if the variable names are not controlled, an attacker can read or write to arbitrary variables, or access arbitrary functions.
Latest vulnerabilities for CWE-627
References
Description of CWE-627 on Mitre website