A low privileged remote attacker can get access to CSRF tokens of higher privileged users which can be abused to mount CSRF attacks.CreditsAndrea PalancaNozomi Networks Security Research TeamReferenceshttps://cert.vde.com/en/advisories/VDE-2024-039