Proof of Concept: ================= The vulnerability can be exploited by remote attackers with service user account. Exploitation requires low user, moderator or admin inter action. For demonstration or reproduce ...