The /login and /change endpoints can return the authenticated user's authentication token in response to a GET request. Since GET requests aren't protected with a CSRF token, this could lead to a malicious 3rd party site acquiring the authentication token.
Version 3.4.5 and soon to be released 4.0.0 are patched.
If you aren't using authentication tokens - you can set the SECURITYTOKENMAX_AGE to "0" (seconds) which should make the token unusable.
None
{ "nvd_published_at": "2021-01-11T21:15:00Z", "cwe_ids": [ "CWE-352" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2021-01-11T20:32:44Z" }