CVE-2023-53980

ProjectSend r1605 contains a remote code execution vulnerability that allows attackers to upload malicious files by manipulating file extensions. Attackers can upload shell scripts with disguised extensions through the upload.process.php endpoint to execute arbitrary commands on the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:projectsend:projectsend:r1605:*:*:*:*:*:*:*

History

26 Dec 2025, 15:40

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/51238 - () https://www.exploit-db.com/exploits/51238 - Exploit, Third Party Advisory
References () https://www.projectsend.org/ - () https://www.projectsend.org/ - Product
References () https://www.vulncheck.com/advisories/projectsend-remote-code-execution-via-file-extension-manipulation - () https://www.vulncheck.com/advisories/projectsend-remote-code-execution-via-file-extension-manipulation - Third Party Advisory, Exploit
First Time Projectsend
Projectsend projectsend
CPE cpe:2.3:a:projectsend:projectsend:r1605:*:*:*:*:*:*:*

22 Dec 2025, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-22 22:16

Updated : 2025-12-26 15:40


NVD link : CVE-2023-53980

Mitre link : CVE-2023-53980

CVE.ORG link : CVE-2023-53980


JSON object : View

Products Affected

projectsend

  • projectsend
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type