A vulnerability allowing an authenticated user with the Backup Operator role to modify backup jobs, which could execute arbitrary code.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.