Rejected reason: After the publication of the PoC by the researcher and further analysis, we have determined that this issue does not constitute a valid vulnerability. The technique described is an obfuscation method and does not bypass or impact any implicit or explicit security controls.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanationNo references available. Run a sync to fetch reference data.