ProjectSend r1605 contains a remote code execution vulnerability that allows attackers to upload malicious files by manipulating file extensions. Attackers can upload shell scripts with disguised extensions through the upload.process.php endpoint to execute arbitrary commands on the server.
Metrics
Affected Vendors & Products
References
History
Mon, 22 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ProjectSend r1605 contains a remote code execution vulnerability that allows attackers to upload malicious files by manipulating file extensions. Attackers can upload shell scripts with disguised extensions through the upload.process.php endpoint to execute arbitrary commands on the server. | |
| Title | ProjectSend r1605 Remote Code Execution via File Extension Manipulation | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-22T22:04:02.619Z
Reserved: 2025-12-20T16:31:20.899Z
Link: CVE-2023-53980
Updated: 2025-12-22T21:57:25.283Z
Status : Received
Published: 2025-12-22T22:16:03.710
Modified: 2025-12-22T22:16:03.710
Link: CVE-2023-53980
No data.
OpenCVE Enrichment
No data.