As stated in the PendingIntent section of the Mitigate security risks in your app
in the Android Developer documentation, an application that receives a PendingIntent can modify unfilled fields of a PendingIntent to allow access to otherwise non-exported components of the vulnerable application
:
Risk: Mutable Pending Intents
A PendingIntent can be mutable, which means that the inner intent that specifies the action can be updated by application B following the logic described in the fillIn() documentation. In other words, the unfilled fields of a PendingIntent can be modified by a malicious app and allow access to otherwise non-exported components of the vulnerable application.
Because of this risk they created a Lint warning for app sources that use PendingIntents without mutability flag, as posted in this question
Can you show an example or a real use case of how such risk could be exploited?
Code snippets help understanding and are appreciated