When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Impact: Read Application DataGain Privileges or Assume IdentityExecute Unauthorized Code or Commands
This weakness can lead to the exposure of resources or functionality to unintended actors, possibly providing attackers with sensitive information or even execute arbitrary code.
Strategy: Libraries or Frameworks
perlbashHigh