It's worth noting that this security vulnerability affects Flatpak, but not the underlying sandbox engine itself (Bubblewrap). Flatpak requires significantly greater complexity and overhead to provide its services. This particular defect came from the high-level logic where Flatpak manages user-defined paths and "portals," and more specifically how the Flatpak portal handles the sandbox-expose options.
Bubblewrap (bwrap), the real security technology underneath, is the minimalist gold standard for unprivileged sandboxing on Linux—additionally taking advantage of Landlock, a powerful Linux Security Module first merged into the stable kernel in 2021. Landlock is a stackable, multidimensional security layer that lets any application tell the kernel, "From now on, you should only let me touch these files, network sockets, hardware or kernel features, etc."
Linux equips you with extreme flexibility building numerous layers of security. All these features are deeply audited and have been engineered over the course of many years. It's pretty cool! Chromium sets up sandboxing differently depending on the OS, which has evolved over time, and it takes advantage of Landlock now for additional security.