Step 1: Victim Interaction: The attacker crafts a malicious link or HTML snippet containing a specially crafted request to the vulnerable PHPEMS function.
Step 2: Social Engineering: The attacker lures a logged-in PHPEMS user into clicking the malicious link or visiting a webpage containing the malicious HTML.
Step 3: Request Execution: The victim's browser, unaware of the malicious intent, automatically sends the crafted request to the PHPEMS server. This is possible because the request originates from the same domain as the victim's active PHPEMS session.
Step 4: Unauthorized Action: The PHPEMS server processes the malicious request, performing the unauthorized action (e.g., changing user settings, creating new accounts, modifying data) on behalf of the victim.
Step 5: Attack Completion: The attacker achieves their objective, potentially gaining control of the victim's account or compromising the system.