Having a service accepting commands with no authorization is a vulnerability. If there are multiple users on the machine they can empty each other’s wallets.
These ‘protections’ do not provide a ‘trusted context’ and cannot defend you from another user on the same computer.
Now your next mistake will be saying ‘but typically there’s only one user’ which is irrelevant because the system runs services as different users for isolation purposes and this vulnerability ignores this isolation.
Rather, it's a problem of DNS resolvers and browsers.