Thanks to the weaknesses that the web application has at the user management level, an attacker could obtain the information from the headers that is necessary to create specially designed URLs and originate malicious actions when a legitimate user is logged into the web application.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03