The product assigns an owner to a resource, but the owner is outside of the intended control sphere.
This may allow the resource to be manipulated by actors outside of the intended control sphere.
Impact: Read Application DataModify Application Data
An attacker could read and modify data for which they do not have permissions to access directly.