ProjectSend r1605 contains an insecure direct object reference vulnerability that allows unauthenticated attackers to download private files by manipulating the download ID parameter. Attackers can access any user's private files by changing the 'id' parameter in the download request to process.php.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/51400 | Exploit Third Party Advisory |
| https://www.projectsend.org/ | Product |
| https://www.vulncheck.com/advisories/projectsend-insecure-direct-object-reference-file-download-vulnerability | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/51400 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-17 23:15
Updated : 2025-12-27 17:15
NVD link : CVE-2023-53930
Mitre link : CVE-2023-53930
CVE.ORG link : CVE-2023-53930
JSON object : View
Products Affected
projectsend
- projectsend
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
