The product does not conform to the API requirements for a function call that requires extra privileges. This could allow attackers to gain privileges by causing the function to be called incorrectly.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.