The vulnerability can be exploited on a drive-by basis by a malicious website.
Source: Threadpost