An attacker can bypass Shiro's authentication with a malicious request containing a payload
An attacker can bypass Shiro's authentication with a malicious request containing a payload