The vulnerability allows a remote attacker to authenticate to the web application with high privileges through multiple hidden hard-coded accounts.
                    
                    
                        The vulnerability allows a remote attacker to authenticate to the web application with high privileges through multiple hidden hard-coded accounts.