Quote from: Wikipedia
In a CSRF attack, an innocent end user is tricked by an attacker into submitting a web request that they did not intend. This may cause actions to be performed on the website that can include inadvertent client or server data leakage, change of session state, or manipulation of an end user's account.
Example with Agora : [img]https://agora.evalyn.app/?action=promote&id=1527[/img]
How to solve it :
-You have to add
if(isSet($_GET['as'])) if($_SESSION['actionSecret'] == $_GET['as'])
-Possibly a longer token, otherwise it would be "easy" to "bruteforce" by generating