If I understand your question well, you imagine a possible exploit like this:
- The attacker creates a PHP page that will present the fake form to the target user.
PHP script file_get_contents, (HTML) , , CSRF HTML CSRF , .
, .
CSRF , CSRF
.. ? !
, CSRF .
- . file_get_contents , , file_get_contents - , CSRF, , ( ) .
, , , , file_get_contents, CSRK , CSRF .
OWASP, CSRF