Hello,
(You may compare Fig 3. on p. 6 in Dubrova et al. to Fig. 3 on p. 25 in Guo et al. -- the flaw is the same.)
These are nice technical papers, both with independent merits, but one certainly shouldn't draw too many conclusions about Kyber itself based on one very leaky encoding gadget in the "mkm4" implementation.
The encoding step can be arranged so that it uses more than 1 random "masking" bit in each word; both attacks are certainly much less effective against such an implementation. Note that this does not require a change the overall masking order and has neglible performance penalty.
Note that side-channel attacks in this setting are always "ultimately successful" even against the most hardened implementations -- one just needs to make the attacks sufficiently costly. The security industry generally uses "attack potential" scoring systems to measure the cost. For this particular implementation, the attack potential just isn't very high. These industry standards already account for things like machine learning template attacks. See Sect 5.5
https://www.sogis.eu/documents/cc/domains/sc/JIL-Application-of-Attack-Potential-to-Smartcards-v3.2.pdf