"The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions." - Entry from the Common Weakness Enumeration
For more info visit CWE-863