The product does not perform access checks on a resource every time the resource is accessed by an entity, which can create resultant weaknesses if that entity's rights or privileges change over time.
Impact: Gain Privileges or Assume IdentityExecute Unauthorized Code or CommandsBypass Protection MechanismRead Application DataOther
A user might retain access to a critical resource even after privileges have been revoked, possibly allowing access to privileged functionality or sensitive information, depending on the role of the resource.