Improper authentication occurs when an application improperly verifies the identity of a user.
A software incorrectly validates user's login information and as a result, an attacker can gain certain privileges within the application or disclose sensitive information that allows them to access sensitive data and provoke arbitrary code execution.
The weakness is introduced during Architecture and Design, Implementation stages.
Latest vulnerabilities for CWE-287
Description of CWE-287 on Mitre website