Skip links

  • Skip to primary navigation
  • Skip to content
  • Skip to footer
OWASP OWASP BLADE: Business Logic Attack Definition Framework BLADE
  • Matrix
  • Phases
  • Tactics
  • Techniques
  • Kill Chains
  • Resources
  • Contribute
    1. Home
    2. >
    3. Techniques
    4. >
    5. Accessibility Options Abuse

    Accessibility Options Abuse

    ID: TEQ-022
    Phase(s): Defence Bypass Attack Execution
    Tactic(s): Mitigation Bypass Human Emulation Fake Interaction

    The adversary uses inbuilt accessibility tools or options to bypass defences, emulate human behaviour or perform actions they shouldn't be allowed to.

    Updated: May 16, 2025

    OWASP BLADE: Business Logic Attack Definition Framework
    © 2025 OWASP BLADE: Business Logic Attack Definition Framework.
    • GitHub

    Cookie Policy

    This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy.

    If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.