The vulnerability allows an authenticated remote attacker to perform actions exceeding their authorized access via crafted HTTP requests.
The vulnerability allows an authenticated remote attacker to perform actions exceeding their authorized access via crafted HTTP requests.