The Letsencrypt CA server checks the txt record of original domain _acme-challenge.importantDomain.com to validate your domain, but you have set the CNAME in step 1, so it goes forward to the aliased domain _acme-challenge.aliasDomainForValidationOnly.com to check.
And acme.sh knows that, so it just added the correct txt record to _acme-challenge.aliasDomainForValidationOnly.com.
So, it’s done. you will get a cert for importantDomain.com, but you don’t need to give the domain control out.
The CNAME target doesn’t have to also be _acme-challenge, does it? If not, do you think you could also add a mode where the alias record has an arbitrary name?
Well, that's also quite a reasonable view. I guess we can see what users think of this issue over time.
I don't have any statistics on where existing _acme-challenge CNAMEs are currently pointing, although maybe LE server-side logs or a DNS scan project based on Certificate Transparency could help clarify this.
FYI I started playing around with this, and 1 of my 5 DNS hosts won't accept a leading underscore for CNAMES.
other platforms may have the same issue, because underscores aren't allowed in hostnames, and a lot of systems validate against hostname rules not domainname rules.
I recently got access to the Censys' BigQuery database to study this precise problem (since it affects the viability of assisted-dns-01 as well). If anyone wants to help out let me know - requires some free time.