An unauthenticated remote attacker can take advantage of...
High severity
Unreviewed
Published
Jun 16, 2025
to the GitHub Advisory Database
•
Updated Jun 16, 2025
Description
Published by the National Vulnerability Database
Jun 16, 2025
Published to the GitHub Advisory Database
Jun 16, 2025
Last updated
Jun 16, 2025
An unauthenticated remote attacker can take advantage of the current overly permissive CORS policy to gain access and read the responses, potentially exposing sensitive data or enabling further attacks.
References