In multiple locations, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.