A vulnerability wherein web applications allow users to modify objects by manipulating identifiers without proper Authorization control checks