The vulnerability stems from a lack of authorization checks in Kirby's content changes API. The advisory states that permissions for updating content were not enforced by the API backend for operations on the 'changes version' (content drafts). The provided patch f5ce1347b427b819bf193acf11fd0da232f7af47 confirms this by adding permission checks to the discard, publish, and save methods within the Kirby\Api\Controller\Changes class. Before the patch, these methods could be called by any authenticated user with Panel access, regardless of their specific role permissions. This allowed unauthorized users to create, modify, or discard content drafts, potentially leading to content loss, content spoofing, or denial of service for editors by creating editing locks. The vulnerable functions are the public static methods in the Changes.php controller that were modified to include the if ($model->permissions()->can('update') === false) check, as these were the entry points for the unauthorized actions.