You can have a scenario in which there is a button aimed at performing function A, but a hacker will place a replica button with a lower z-index that gets triggered to perform function B when a user has clicked the normal button that they are able to see.