Description
A flaw has been found in projectsend up to r1720. Impacted is an unknown function of the component File Editor/Custom Download Aliases. This manipulation causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. Upgrading to version r1945 is recommended to address this issue. Patch name: 334da1ea39cb12f6b6e98dd2f80bb033e0c7b845. It is advisable to upgrade the affected component.
References (7)
Core 7
Core References
Issue Tracking issue-tracking
https://github.com/projectsend/projectsend/pull/1450
Release Notes patch
https://github.com/projectsend/projectsend/releases/tag/r1945
Permissions Required, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.332558
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.332558
Permissions Required, VDB Entry third-party-advisory
https://vuldb.com/?submit.686533
Patch patch
https://github.com/projectsend/projectsend/commit/334da1ea39cb12f6b6e98dd2f80bb033e0c7b845
Various Sources product
https://github.com/projectsend/projectsend/
Scores
CVSS v3
3.5
EPSS
0.0003
EPSS Percentile
9.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
CWE-94
Status
published
Products (2)
n/a/projectsend
r1720
n/a/projectsend
r1945
Published
Nov 16, 2025
Tracked Since
Feb 18, 2026