Checklist
Version
Description
Some sensitive actions (changing a user's password, allowing a user to use the command execution feature) can be used by an authenticated user without an additional security prompt like reentering the password. This means that those actions can be misused via XSS or a local attacker with access to an unlocked device.
Thanks @mtausig for the report.
What did you expect to happen?
No response
What actually happened?
No response
Reproduction Steps
No response
Files
No response