CVE-2025-46743
12.05.2025, 17:15
An authenticated user's token could be used by another source after the user had logged out prior to the token expiring.
Common Weakness Enumeration
An authenticated user's token could be used by another source after the user had logged out prior to the token expiring.