The product validates data before it has been filtered, which prevents the product from detecting data that becomes invalid after the filtering step.
Extended description
This can be used by an attacker to bypass the validation and launch attacks that expose weaknesses that would otherwise be prevented, such as injection.
Best practices to prevent this CWE
Phase: Implementation; Architecture and Design
Inputs should be decoded and canonicalized to the application's current internal representation before being filtered.