An improper access control vulnerability exists where an authenticated user could access areas outside of their authorized scope.