Authorization of user is the process of identiication of actor's identity and verification of his access to certain information or conducting actions. Under the influence of the weakness, software isn't able to perform checking properly that allows attackers to get access not only to potentially sensitive information and modify it, but also to privileged functionality.
The vulnerability may result in information exposures, denial of service, and arbitrary code execution. The weakness is intoduced during Architecture and Design, Implementaton, Operation stages.
Latest vulnerabilities for CWE-285
Description of CWE-285 on Mitre website