The vulnerability is a Cross-Site Request Forgery (CSRF) on the Mattermost Calls widget page, identified as CVE-2025-62190. The analysis of the fixing commit 429cfaf2a301a369414d1ca18a3364e85901c8d1 reveals that the vulnerability lies in the handleServeStandalone function within server/api.go. This function is responsible for serving the standalone widget's HTML page. The patch introduces Referrer-based CSRF protection to this function. Previously, the absence of such a check allowed an attacker to embed or link to the widget URL from an external malicious website. When an authenticated user visited this malicious site, their browser would automatically send a request to the widget endpoint, leading to unauthorized actions being performed on their behalf, such as initiating calls or sending messages. The added code explicitly checks if the request's 'Referer' header matches the application's host, thus ensuring the request originates from a legitimate context and preventing the CSRF attack.