This issue [...] could enable an unauthenticated user to impersonate another user and perform the operations that the ...