Let's look at a couple of ways an attacker could tamper with an HTTP request to escalate their privileges.