From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Code Changes: - File: - Lines changed: 161 - Lines added: 141 - Lines deleted: 20 2. Changes Made: - Added and to the application list. These applications cannot be executed via the manager action unless the user has write permissions. - Added , , , , and to the function list. These functions cannot be executed via the manager action unless the user has write permissions. - If the application attempts to be executed via the manager action and the parameter is specified in , execution will be denied unless the manager user has or permissions. 3. Issue Fixed: - Fixed the issue referenced as . 4. Code Structure: - Added the structure to store permission information. - Added functions , , and for matching permissions. - Added the function to check whether permissions are allowed. 5. Permission Checks: - The code includes detailed permission checks to ensure that only users with specific permissions can execute the manager action. This information indicates that the code changes were implemented to strengthen permission checks for the manager action, preventing unauthorized users from performing sensitive operations.