What is it:

tricks user into performing actions on a site where they are authenticated, without their consent.

How attack works:

Example:

How does CSRF work?

3 conditions must be there:

Prevention: