Any unauthenticated attacker can bypass the localhost restrictions posed by the application and utilize this to create arbitrary packages
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-7346.json"