Projectsend Projectsend

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Projectsend.

Known Exploited Projectsend Vulnerabilities

The following Projectsend vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.

Title Description Added
ProjectSend Improper Authentication Vulnerability ProjectSend contains an improper authentication vulnerability that allows a remote, unauthenticated attacker to enable unauthorized modification of the application's configuration via crafted HTTP requests to options.php. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
CVE-2024-11680 Exploit Probability: 93.5%
December 3, 2024

The vulnerability CVE-2024-11680: ProjectSend Improper Authentication Vulnerability is in the top 1% of the currently known exploitable vulnerabilities.

By the Year

In 2026 there have been 3 vulnerabilities in Projectsend with an average score of 4.6 out of ten. Last year, in 2025 Projectsend had 5 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Projectsend in 2026 could surpass last years number. Last year, the average CVE base score was greater by 2.12




Year Vulnerabilities Average Score
2026 3 4.60
2025 5 6.72
2024 3 7.53
2023 1 4.80
2022 1 5.70
2021 5 7.46
2020 0 0.00
2019 5 7.47

It may take a day or so for new Projectsend vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Projectsend Security Vulnerabilities

ProjectSend LDAP Email Manipulation RCE Remote Exploit
CVE-2026-4045 3.7 - Low - March 12, 2026

A flaw has been found in projectsend up to r1945. This impacts an unknown function of the file includes/Classes/Auth.php. Executing a manipulation of the argument ldap_email can lead to observable response discrepancy. The attack can be executed remotely. A high complexity level is associated with this attack. The exploitability is said to be difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Observable Response Discrepancy

ProjectSend PHP Delete Handler Realpath Path Traversal
CVE-2026-4044 3.8 - Low - March 12, 2026

A vulnerability was detected in projectsend up to r1945. This affects the function realpath of the file /import-orphans.php of the component Delete Handler. Performing a manipulation of the argument files[] results in path traversal. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Directory traversal

Missing Auth in ProjectSend AJAX Endpoints
CVE-2026-3977 6.3 - Medium - March 12, 2026

A security vulnerability has been detected in projectsend up to r1945. The affected element is an unknown function of the component AJAX Endpoints. The manipulation leads to missing authorization. The attack can be initiated remotely. The identifier of the patch is 35dfd6f08f7d517709c77ee73e57367141107e6b. To fix this issue, it is recommended to deploy a patch.

AuthZ

ProjectSend RCE via File Extension Spoofing in upload.process.php
CVE-2023-53980 9.8 - Critical - December 22, 2025

ProjectSend r1605 contains a remote code execution vulnerability that allows attackers to upload malicious files by manipulating file extensions. Attackers can upload shell scripts with disguised extensions through the upload.process.php endpoint to execute arbitrary commands on the server.

Unrestricted File Upload

ProjectSend IDOR: Unauth File Download via process.php
CVE-2023-53930 7.5 - High - December 17, 2025

ProjectSend r1605 contains an insecure direct object reference vulnerability that allows unauthenticated attackers to download private files by manipulating the download ID parameter. Attackers can access any user's private files by changing the 'id' parameter in the download request to process.php.

Insecure Direct Object Reference / IDOR

Auth Administrator XSS in ProjectSend r1605 via Custom Assets
CVE-2023-53906 4.8 - Medium - December 17, 2025

projectSend r1605 contains a stored cross-site scripting vulnerability that allows authenticated administrators to inject malicious JavaScript through the custom assets configuration page. Attackers can craft a JavaScript payload in the custom assets section that will execute when other users load the affected page, enabling persistent script injection.

XSS

ProjectSend CSV Injection via profile names triggers code exec
CVE-2023-53905 8 - High - December 17, 2025

ProjectSend r1605 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into user profile names. Attackers can craft payloads like =calc|a!z| in the name field to trigger code execution when administrators export action logs as CSV files.

CSV Injection

projectSend XSS in File Editor/Custom Download Aliases (R1720)
CVE-2025-13232 3.5 - Low - November 16, 2025

A flaw has been found in projectsend up to r1720. Impacted is an unknown function of the component File Editor/Custom Download Aliases. This manipulation causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. Upgrading to version r1945 is recommended to address this issue. Patch name: 334da1ea39cb12f6b6e98dd2f80bb033e0c7b845. It is advisable to upgrade the affected component.

XSS

ProjectSend Improper Authentication Vulnerability in options.php
CVE-2024-11680 9.8 - Critical - November 26, 2024

ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.

Missing Authentication for Critical Function

ProjectSend PHP Random Token RNG Weakness (CVE-2024-7659)
CVE-2024-7659 7.5 - High - August 12, 2024

A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. It is recommended to upgrade the affected component.

Use of Insufficiently Random Values

ProjectSend Remote Resource ID Control Vulnerability (CVE-2024-7658)
CVE-2024-7658 5.3 - Medium - August 12, 2024

A vulnerability, which was classified as problematic, has been found in projectsend up to r1605. This issue affects the function get_preview of the file process.php. The manipulation leads to improper control of resource identifiers. The attack may be initiated remotely. Upgrading to version r1720 is able to address this issue. The patch is named eb5a04774927e5855b9d0e5870a2aae5a3dc5a08. It is recommended to upgrade the affected component.

Insecure Direct Object Reference / IDOR

projectsend Stored XSS via Input Handling
CVE-2023-0607 4.8 - Medium - February 01, 2023

Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606.

XSS

A vulnerability, which was classified as problematic, was found in ProjectSend r754
CVE-2017-20101 5.7 - Medium - June 27, 2022

A vulnerability, which was classified as problematic, was found in ProjectSend r754. This affects an unknown part of the file process.php?do=zip_download. The manipulation of the argument client/file leads to information disclosure. It is possible to initiate the attack remotely.

Insecure Direct Object Reference / IDOR

Projectsend version r1295 is affected by a directory traversal vulnerability
CVE-2021-40887 9.8 - Critical - October 11, 2021

Projectsend version r1295 is affected by a directory traversal vulnerability. Because of lacking sanitization input for files[] parameter, an attacker can add ../ to move all PHP files or any file on the system that has permissions to /upload/files/ folder.

Directory traversal

Projectsend version r1295 is affected by Cross Site Scripting (XSS) due to lack of sanitization when echo output data in returnFilesIds() function
CVE-2021-40888 5.4 - Medium - October 11, 2021

Projectsend version r1295 is affected by Cross Site Scripting (XSS) due to lack of sanitization when echo output data in returnFilesIds() function. A low privilege user can call this function through process.php file and execute scripting code.

XSS

Projectsend version r1295 is affected by sensitive information disclosure
CVE-2021-40884 8.1 - High - October 11, 2021

Projectsend version r1295 is affected by sensitive information disclosure. Because of not checking authorization in ids parameter in files-edit.php and id parameter in process.php function, a user with uploader role can download and edit all files of users in application.

AuthZ

Projectsend version r1295 is affected by a directory traversal vulnerability
CVE-2021-40886 6.5 - Medium - October 11, 2021

Projectsend version r1295 is affected by a directory traversal vulnerability. A user with Uploader role can add value `2` for `chunks` parameter to bypass `fileName` sanitization.

Directory traversal

reset-password.php in ProjectSend before r1295 allows remote attackers to reset a password because of incorrect business logic
CVE-2020-28874 7.5 - High - January 26, 2021

reset-password.php in ProjectSend before r1295 allows remote attackers to reset a password because of incorrect business logic. Errors are not properly considered (an invalid token parameter).

Improper Privilege Management

CSV Injection was discovered in ProjectSend before r1053
CVE-2018-7201 - May 22, 2019

CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel.

An issue was discovered in ProjectSend before r1053
CVE-2018-7202 - May 22, 2019

An issue was discovered in ProjectSend before r1053. XSS exists in the "Name" field on the My Account page.

Cross-site scripting (XSS) vulnerability in ProjectSend before r1070
CVE-2019-11533 6.1 - Medium - April 26, 2019

Cross-site scripting (XSS) vulnerability in ProjectSend before r1070 allows remote attackers to inject arbitrary web script or HTML.

XSS

ProjectSend before r1070 writes user passwords to the server logs.
CVE-2019-11492 7.5 - High - April 26, 2019

ProjectSend before r1070 writes user passwords to the server logs.

Insertion of Sensitive Information into Log File

An issue was discovered in ProjectSend r1053
CVE-2019-11378 8.8 - High - April 20, 2019

An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.

Unrestricted File Upload

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Projectsend or by Projectsend? Click the Watch button to subscribe.

Projectsend
Vendor

Projectsend
Product

subscribe