If a user is able to access the privileges of higher roles than the role he has actually been assigned, he does so by intercepting and changing the values of the parameters that are sent by a browser to the server. In the case select the weakness that fits best in this scenario.