It is easy to identify the vulnerable method included in a GET request. For this reason, some developers limit the type of request received by the application to just accept POST requests, however, as we reviewed before, it is possible to exploit a CSRF using POST requests.