The software inability to check the correctness of authentication exposes malicious users possibilities to bypass through it using all possible ways and methods.
The vulnerability is introduced during Architecture and Design, Implementation, Operation stages.