ProjectSend r1605 contains a remote code execution vulnerability that allows attackers to upload malicious files by manipulating file extensions. Attackers can upload shell scripts with disguised extensions through the upload.process.php endpoint to execute arbitrary commands on the server.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/51238 | Exploit Third Party Advisory |
| https://www.projectsend.org/ | Product |
| https://www.vulncheck.com/advisories/projectsend-remote-code-execution-via-file-extension-manipulation | Third Party Advisory Exploit |
| https://www.exploit-db.com/exploits/51238 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-22 22:16
Updated : 2025-12-26 15:40
NVD link : CVE-2023-53980
Mitre link : CVE-2023-53980
CVE.ORG link : CVE-2023-53980
JSON object : View
Products Affected
projectsend
- projectsend
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
