I found that a website protects itself of CSRF attacks by validating the POST request contains a specific header:
-Example-header: GF
What i find strange is that this header doesn't have a csrf token in it, it is just a custom header with a 2 letters value that validates the POST request.
When i try to add it in the HXR request it executes as OPTIONS instead of POST and the attack fails. is there any way to bypass this? i find this kind of stupid because why other websites implementing a personal large token in the custom header, if by adding a simple header with a short value the requests preflights???
The html and javascript was made with burp suite professional and it worked, but then adding the special header preflights the request.
EDIT: i am making a new post because maybe there is a way to bypass this and the other post is 7 years old and doesn't answer my question. there are some tricks like deleting the content-type in request, etc. that might do the trick.