An issue in AsyncSSH before 2.14.1 allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation, aka a "Rogue Session Attack."
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.