A library management system,LMS, is being used by a college to manage the book transactions by students and faculties with library. The functionalities of the application have been grouped and access permissions have been given based on the role played by the user. However one of the modules that was recently added for the role 'admin' did not include the routine to check the access privilege before rendering the web page. One of the students, Jack, with the idea of exploring the features of the application tried manipulating the URLs. In this process, Jack, not having admin privileges was able to view the web page.Identify the vulnerability in the application which has made Jack's attempt successful.