← Volver a CVEs
CVE-2023-53980
CRITICAL9.8
Descripcion
ProjectSend r1605 contains a remote code execution vulnerability that allows attackers to upload malicious files by manipulating file extensions. Attackers can upload shell scripts with disguised extensions through the upload.process.php endpoint to execute arbitrary commands on the server.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado12/22/2025
Ultima modificacion12/26/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
projectsend:projectsend
Debilidades (CWE)
CWE-434
Referencias
https://www.exploit-db.com/exploits/51238(disclosure@vulncheck.com)
https://www.projectsend.org/(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/projectsend-remote-code-execution-via-file-extension-manipulation(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/51238(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.