Authentication mechanisms are often implemented incorrectly, allowing attackers to compromise authentication tokens.
OWASP Foundation. (2021). OWASP Top 10:2021. https://owasp.org/Top10/