Unauthorized access vulnerability in the mobile application (com.transsion.phoenix) can lead to the leakage of user information.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.