@b0rk What that page misses is consideration of the question: is there any chance the content on my site could be used maliciously?
That is, if my site allows user-uploaded content, how sure am I that there's zero chance my site might end up hosting something malicious?
Which, of course, has nothing to do with credentials.
Or, I guess, put another way: yes, credential and identity exfiltration is one vulnerability addressed by CORS (and CSP), but it's not the only one.
One specific example here is a scenario where a site allows users to upload their own avatar image, say in PNG format. But instead of sending a PNG, the user uploads a JS file but sends its content-type: image/png. The site thinks "it's just an image" and doesn't bother to check that the content is actually valid.
If that site then has ACAO: *, it has just become a hosting service for malicious code.
Write-up for an SVG alternative to this attack: https://www.cloudflare.com/cloudforce-one/research/svgs-the-hackers-canvas/