The weakness may exist due to unproper using of potentially dangerous function that can cause security problems. In case of correct applying of that function it doesn't threaten.
The vulnerability is introduced during Architecture and Design, Implementation stages.