Trusting Client-Provided Content-Type
Applications rely solely on the Content-Type header sent by clients to validate uploaded files. Attackers can easily manipulate this header to bypass restrictions, uploading malicious executable files while claiming they're images or documents.