The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controlled or modified by the attacker.
Best practices to prevent this CWE
Phase: Architecture and Design; Operation; Implementation
Implement proper protection for immutable data (e.g. environment variable, hidden form fields, etc.)