An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
By consolidating important information from various applications into one system, you enable stakeholders to see progress in ...