This issue was discussed by the Drupal Security Team, and their decision was that this can be solved in a public issue.
The Drupal token system has an access permissions vulnerability. Currently, there is no way for it to reliably check entity view permissions when replacing tokens, which can lead to inadvertent information disclosure.
When sending an email with token-embedded messages, such as notifying user B about content created by user A:
Add an optional $account parameter to Token::replace() and hook_tokens() to specify the recipient for proper access checks. This should be added via the $options argument to maintain backward compatibility.
Determine if adding the $account parameter to $options in Token::replace() and hook_tokens() is the most robust and future-proof solution.
Active
11.1 🔥
token system
It makes Drupal less vulnerable to abuse or misuse. Note, this is the preferred tag, though the Security tag has a large body of issues tagged to it. Do NOT publicly disclose security vulnerabilities; contact the security team instead. Anyone (whether security team or not) can apply this tag to security improvements that do not directly present a vulnerability e.g. hardening an API to add filtering to reduce a common mistake in contributed modules.