FAQ How could an attacker exploit the vulnerability? An authenticated attacker could make specially crafted API calls that lead to a Denial of Service.