This is a wormable vulnerability that is very easy to exploit and we expect imminent and automated exploitation of this vulnerability.
As for the pre-requisites, for the explioit to work no user of the application needs to have "Two Factor Authentication" (2FA) enabled within Really SImple Security. As soon as the 2FA feature is enabled, an unauthenticated attacker can make a request to the vulnerable function and WordPress will return a valid session token for the victim.
A partial proof of concept has been released which does not work out of the box. However, due to how simple this vulnerability is, it requires little effort to get it working.