It appears that users in this case include agents such as software. A bit confusing for the general public.
It can theoretically even be exploited via a browser:
[Q] What about web browsers?
[A] In theory, remotely exploiting this vulnerability from the web browser is possible. In practice, demonstrating successful attacks via web browsers requires additional research and engineering efforts.
ryannathans@lemmy.world 1 year ago
Shared use of servers is probably the main issue