| http://www.w3.org/ns/prov#value | - An attacker may be aware of the functionality and attempt to bypass this presentation layer access control by crafting their own custom message and sending this in an attempt to execute the functionality.+A POST request is received which is not authorized for the current user and the user could not have performed this action without crafting a custom POST request.
|