projectSend r1605 contains a stored cross-site scripting vulnerability that allows authenticated administrators to inject malicious JavaScript through the custom assets configuration page. Attackers can craft a JavaScript payload in the custom assets section that will execute when other users load the affected page, enabling persistent script injection.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/51518 | Exploit Third Party Advisory |
| https://www.projectsend.org/ | Product |
| https://www.vulncheck.com/advisories/projectsend-stored-cross-site-scripting-via-custom-assets-page | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/51518 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-17 23:15
Updated : 2025-12-27 17:15
NVD link : CVE-2023-53906
Mitre link : CVE-2023-53906
CVE.ORG link : CVE-2023-53906
JSON object : View
Products Affected
projectsend
- projectsend
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
