Csharp Labs
Explore 1 lab in Csharp.
Authorization tokens used to establish initial trust must have a one-time-use property. Examples include tokens for password reset, multi-factor authentication (MFA) setup, or API key registration. If these tokens can be reused, an adversary who intercepts or replays them may gain unauthorised access, reset credentials, or escalate privileges. Reusable tokens increase the risk of replay attacks, account takeover, and persistence in sensitive workflows.
A common pitfall is the misuse of JSON Web Tokens (JWTs) as one-time tokens. JWTs are inherently stateless and cannot be revoked or invalidated after first use without introducing additional state management. If a JWT is issued for account recovery or sensitive one-time actions, its reuse could allow repeated execution of privileged actions until the token naturally expires.
Select a language to explore available labs for this vulnerability.
Try adjusting your language filter.
Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.
Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.
Read more