Summary
Several integrations are vulnerable to requests to unexpected APIs of the integrated services and retrieve their responses. This could lead to significant information disclosure, including credentials (like API keys or passwords), personal information, internal settings, etc., that could end up even in remote code execution.
Summary
Several integrations are vulnerable to requests to unexpected APIs of the integrated services and retrieve their responses. This could lead to significant information disclosure, including credentials (like API keys or passwords), personal information, internal settings, etc., that could end up even in remote code execution.