Step 1: Victim Login: An administrator logs into the vulnerable WordPress installation.
Step 2: Attacker Crafting: The attacker crafts a malicious HTML page or email containing a hidden form or JavaScript that automatically submits a request to wp-admin/options-discussion.php to move comments to moderation.
Step 3: Victim Interaction: The administrator, while logged in, visits the attacker's malicious page or opens the malicious email. This triggers the hidden form submission.
Step 4: Request Execution: The administrator's browser, still authenticated to the WordPress site, sends the crafted request to the server. Because there is no CSRF protection, the server processes the request as if it originated from the administrator.
Step 5: Comment Manipulation: The WordPress server moves the targeted comments to the moderation queue, effectively hiding them from public view or potentially causing a denial-of-service by overwhelming the moderation queue.