Popular platforms for products such as Apple, Facebook, Google and others have features called login with 'x'. This can be used to login with your 'x' account on another site.
Sign In with Apple uses JSON Web tokens or JWT's for short. They are used for stateless authentication. Essentially, a token (with authorization levels of the user) is digitally signed by the server. The signature prevents tampering of the token.
When going through the process, a user can choose to either share or not share their email. Upon this, Apple will generate an email for you.
The hacker found a signing oracle. By setting the emailID of another user in the request, it was possible to get back a JWT (signed) from Apple!
This allowed for a complete account takeover on any Sign In with Apple Account.
Even the most simple bugs exist in the most tested applications. When testing, even the simple issues should still be tested.