This question is based on the observation that any user can always do a commit on an object to which he has write access (a user who has a session can send JSON to the Mendix Business Server with a Commit command and a GUID). This commit call does not call any validations: it simply commits the object to the database. This could in theory lead to corrupt data in the database.
Originally, I wanted to display a proper error message when such a situation would occur. On closer evaluation, this is not necessary: if a user is sending custom JSON messages to the server, it is okay if an ugly error is shown, because this is not a scenario which we support.
My final solution to this problem (a user being able to send JSON Commit messages) is two fold:
Furthermore, I submitted a support ticket to Mendix, to be able to specify commit rights on an entity, just like a business engineer can specify create and delete rights on an entity. This would mean that a user without such rights could only commit objects through a microflow which is executed with the 'apply entity access' setting set to false. By only allowing commits through microflows, I can ensure that all data is validated before I commit it to the database.