According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability? An authorized attacker must send the user a malicious file and convince the user to open it.
<a href="https://blog.xlab.app/">xinyue.hu</a> with <a href="https://www.chaitin.cn/">Chaitin</a>, <a href="https://blog.xlab.app/">xinyue.hu</a> with <a href="https://www.chaitin.cn/">Chaitin</a>