This vulnerability occurs when a system or administrator assigns a user to the wrong security group or role.
When a user is placed into a group with higher privileges than intended, they can bypass security controls. This allows unauthorized access to sensitive data, functions, or system resources that should be off-limits, effectively creating a privilege escalation path. Access control systems typically trust group assignments, so they won't flag this incorrect membership as malicious activity. This makes the issue hard to detect, allowing potential abuse to go unnoticed unless specific user actions are audited against their intended permissions.
Impact: Gain Privileges or Assume Identity