In this case, a sophisticated attacker can get certificates for domains they don’t control by abusing this.
In this case, a sophisticated attacker can get certificates for domains they don’t control by abusing this.