serenity.net.web is vulnerable to Insufficient Session Expiration. A link contains a token that could be used to reset a password, but it has a three-hour expiration date and is given as a query parameter. If the attacker has access to the browser history, they can use the token once more to obtain control of the account.
packetstormsecurity.com/files/172648/Serenity-StartSharp-Software-File-Upload-XSS-User-Enumeration-Reusable-Tokens.html
seclists.org/fulldisclosure/2023/May/14
github.com/advisories/GHSA-2hp9-3xfr-r9w2
github.com/serenity-is/Serenity/commit/11b9d267f840513d04b4f4d4876de7823a6e48d2
github.com/serenity-is/Serenity/commit/7197b4385d354d59e5107d7b049a8f1486f0caa9