an attacker can use this as means to elevate privileges.