CVE-2023-53905

ProjectSend r1605 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into user profile names. Attackers can craft payloads like =calc|a!z| in the name field to trigger code execution when administrators export action logs as CSV files.
Configurations

Configuration 1 (hide)

cpe:2.3:a:projectsend:projectsend:r1605:*:*:*:*:*:*:*

History

27 Dec 2025, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 8.0

26 Dec 2025, 16:01

Type Values Removed Values Added
CPE cpe:2.3:a:projectsend:projectsend:r1605:*:*:*:*:*:*:*
References () https://www.exploit-db.com/exploits/51517 - () https://www.exploit-db.com/exploits/51517 - Exploit, Third Party Advisory
References () https://www.projectsend.org/ - () https://www.projectsend.org/ - Product
References () https://www.vulncheck.com/advisories/projectsend-csv-injection-via-user-account-export-functionality - () https://www.vulncheck.com/advisories/projectsend-csv-injection-via-user-account-export-functionality - Third Party Advisory
First Time Projectsend
Projectsend projectsend

18 Dec 2025, 15:15

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/51517 - () https://www.exploit-db.com/exploits/51517 -

17 Dec 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-17 23:15

Updated : 2025-12-27 17:15


NVD link : CVE-2023-53905

Mitre link : CVE-2023-53905

CVE.ORG link : CVE-2023-53905


JSON object : View

Products Affected

projectsend

  • projectsend
CWE
CWE-1236

Improper Neutralization of Formula Elements in a CSV File