ProjectSend r1605 contains a remote code execution vulnerability that allows attackers to upload malicious files by manipulating file extensions. Attackers can upload shell scripts with disguised extensions through the upload.process.php endpoint to execute arbitrary commands on the server.
Metrics
Affected Vendors & Products
References
History
Fri, 26 Dec 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:projectsend:projectsend:r1605:*:*:*:*:*:*:* |
Tue, 23 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Projectsend
Projectsend projectsend |
|
| Vendors & Products |
Projectsend
Projectsend projectsend |
Mon, 22 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ProjectSend r1605 contains a remote code execution vulnerability that allows attackers to upload malicious files by manipulating file extensions. Attackers can upload shell scripts with disguised extensions through the upload.process.php endpoint to execute arbitrary commands on the server. | |
| Title | ProjectSend r1605 Remote Code Execution via File Extension Manipulation | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-22T21:35:36.344Z
Updated: 2025-12-22T22:04:02.619Z
Reserved: 2025-12-20T16:31:20.899Z
Link: CVE-2023-53980
Updated: 2025-12-22T21:57:25.283Z
Status : Analyzed
Published: 2025-12-22T22:16:03.710
Modified: 2025-12-26T15:40:38.417
Link: CVE-2023-53980
No data.