"The product uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism." - Entry from the Common Weakness Enumeration
For more info visit CWE-807