Attacker creates forged HTTP requests and tricks a victim into submitting them via image tags, XSS, or numerous other techniques. If the user is authenticated, the attack succeeds. This kind of attack comes under the risk of following security risk?
Injection
Cross Site Scripting
Cross Site Request Forgery
Security Misconfiguration