The weakness is caused by improper checking of data or communication source validity that allows attackers to gain access to any functionality availble for the source.
The vulnerability is introduced during Architecture and Design, Implementation stages.