logo
Home/CWEs/CWE-268/

CWE-268 - Privilege Chaining

  • Abstraction:Base
  • Structure:Simple
  • Status:Draft
  • Release Date:2006-07-19
  • Latest Modification Date:2023-06-29

Weakness Name

Privilege Chaining

Description

Two distinct privileges, roles, capabilities, or rights can be combined in a way that allows an entity to perform unsafe actions that would not be allowed without that combination.

Common Consequences

Scope: Access Control

Impact: Gain Privileges or Assume Identity

Notes: A user can be given or gain access rights of another user. This can give the user unauthorized access to sensitive information including the access information of another user.

Related Weaknesses

CWE-269Improper Privilege ManagementMedium