projectsend CVE Vulnerabilities & Metrics

Focus on projectsend vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About projectsend Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with projectsend. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total projectsend CVEs: 24
Earliest CVE date: 07 Jan 2015, 18:59 UTC
Latest CVE date: 26 Nov 2024, 10:15 UTC

Latest CVE reference: CVE-2024-11680

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 3

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical projectsend CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.25

Max CVSS: 10.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 5
4.0-6.9 12
7.0-8.9 6
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS projectsend CVEs

These are the five CVEs with the highest CVSS scores for projectsend, sorted by severity first and recency.

All CVEs for projectsend

CVE-2024-11680 projectsend vulnerability CVSS: 0 26 Nov 2024, 10:15 UTC

ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.

CVE-2024-7659 projectsend vulnerability CVSS: 2.6 12 Aug 2024, 13:38 UTC

A vulnerability, which was classified as problematic, was found in projectsend up to r1605. Affected is the function generate_random_string of the file includes/functions.php of the component Password Reset Token Handler. The manipulation leads to insufficiently random values. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version r1720 is able to address this issue. The name of the patch is aa27eb97edc2ff2b203f97e6675d7b5ba0a22a17. It is recommended to upgrade the affected component.

CVE-2024-7658 projectsend vulnerability CVSS: 5.0 12 Aug 2024, 13:38 UTC

A vulnerability, which was classified as problematic, has been found in projectsend up to r1605. This issue affects the function get_preview of the file process.php. The manipulation leads to improper control of resource identifiers. The attack may be initiated remotely. Upgrading to version r1720 is able to address this issue. The patch is named eb5a04774927e5855b9d0e5870a2aae5a3dc5a08. It is recommended to upgrade the affected component.

CVE-2023-0607 projectsend vulnerability CVSS: 0 01 Feb 2023, 04:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606.

CVE-2017-20101 projectsend vulnerability CVSS: 3.5 27 Jun 2022, 14:15 UTC

A vulnerability, which was classified as problematic, was found in ProjectSend r754. This affects an unknown part of the file process.php?do=zip_download. The manipulation of the argument client/file leads to information disclosure. It is possible to initiate the attack remotely.

CVE-2021-40888 projectsend vulnerability CVSS: 3.5 11 Oct 2021, 11:15 UTC

Projectsend version r1295 is affected by Cross Site Scripting (XSS) due to lack of sanitization when echo output data in returnFilesIds() function. A low privilege user can call this function through process.php file and execute scripting code.

CVE-2021-40887 projectsend vulnerability CVSS: 10.0 11 Oct 2021, 11:15 UTC

Projectsend version r1295 is affected by a directory traversal vulnerability. Because of lacking sanitization input for files[] parameter, an attacker can add ../ to move all PHP files or any file on the system that has permissions to /upload/files/ folder.

CVE-2021-40886 projectsend vulnerability CVSS: 4.0 11 Oct 2021, 11:15 UTC

Projectsend version r1295 is affected by a directory traversal vulnerability. A user with Uploader role can add value `2` for `chunks` parameter to bypass `fileName` sanitization.

CVE-2021-40884 projectsend vulnerability CVSS: 5.5 11 Oct 2021, 11:15 UTC

Projectsend version r1295 is affected by sensitive information disclosure. Because of not checking authorization in ids parameter in files-edit.php and id parameter in process.php function, a user with uploader role can download and edit all files of users in application.

CVE-2020-28874 projectsend vulnerability CVSS: 5.0 26 Jan 2021, 18:15 UTC

reset-password.php in ProjectSend before r1295 allows remote attackers to reset a password because of incorrect business logic. Errors are not properly considered (an invalid token parameter).

CVE-2018-7201 projectsend vulnerability CVSS: 6.8 22 May 2019, 21:29 UTC

CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel.

CVE-2019-11533 projectsend vulnerability CVSS: 4.3 26 Apr 2019, 21:29 UTC

Cross-site scripting (XSS) vulnerability in ProjectSend before r1070 allows remote attackers to inject arbitrary web script or HTML.

CVE-2019-11492 projectsend vulnerability CVSS: 5.0 26 Apr 2019, 21:29 UTC

ProjectSend before r1070 writes user passwords to the server logs.

CVE-2019-11378 projectsend vulnerability CVSS: 6.5 20 Apr 2019, 15:29 UTC

An issue was discovered in ProjectSend r1053. upload-process-form.php allows finished_files[]=../ directory traversal. It is possible for users to read arbitrary files and (potentially) access the supporting database, delete arbitrary files, access user passwords, or run arbitrary code.

CVE-2016-10734 projectsend vulnerability CVSS: 7.5 29 Oct 2018, 12:29 UTC

ProjectSend (formerly cFTP) r582 allows Insecure Direct Object Reference via includes/actions.log.export.php.

CVE-2016-10733 projectsend vulnerability CVSS: 7.5 29 Oct 2018, 12:29 UTC

ProjectSend (formerly cFTP) r582 allows directory traversal via file=../ in the process-zip-download.php query string.

CVE-2016-10732 projectsend vulnerability CVSS: 7.5 29 Oct 2018, 12:29 UTC

ProjectSend (formerly cFTP) r582 allows authentication bypass via a direct request for users.php, home.php, edit-file.php?file_id=1, or process-zip-download.php, or add_user_form_* parameters to users-add.php.

CVE-2016-10731 projectsend vulnerability CVSS: 7.5 29 Oct 2018, 12:29 UTC

ProjectSend (formerly cFTP) r582 allows SQL injection via manage-files.php with the request parameter status, manage-files.php with the request parameter files, clients.php with the request parameter selected_clients, clients.php with the request parameter status, process-zip-download.php with the request parameter file, or home-log.php with the request parameter action.

CVE-2017-9786 projectsend vulnerability CVSS: 4.3 06 Mar 2018, 16:29 UTC

Cross-site scripting (XSS) vulnerability in ProjectSend (formerly cFTP) before commit 6c3710430be26feb5371cb0377e5355d6f9a27ca allows remote attackers to inject arbitrary web script or HTML via the Description field in My account Name updated, related to home.php and actions-log.php.

CVE-2017-9783 projectsend vulnerability CVSS: 4.3 06 Mar 2018, 16:29 UTC

Cross-site scripting (XSS) vulnerability in ProjectSend (formerly cFTP) before commit 6c3710430be26feb5371cb0377e5355d6f9a27ca allows remote attackers to inject arbitrary web script or HTML via the Description field in a Site name updated.

CVE-2017-9741 projectsend vulnerability CVSS: 7.5 18 Jun 2017, 21:29 UTC

install/make-config.php in ProjectSend r754 allows remote attackers to execute arbitrary PHP code via the dbprefix parameter, related to replacing TABLES_PREFIX in the configuration file.

CVE-2015-2564 projectsend vulnerability CVSS: 6.5 20 Mar 2015, 14:59 UTC

SQL injection vulnerability in client-edit.php in ProjectSend (formerly cFTP) r561 allows remote authenticated users to execute arbitrary SQL commands via the id parameter to users-edit.php.

CVE-2014-9580 projectsend vulnerability CVSS: 4.3 08 Jan 2015, 19:59 UTC

Cross-site scripting (XSS) vulnerability in ProjectSend (formerly cFTP) r561 allows remote attackers to inject arbitrary web script or HTML via the Description field in a file upload. NOTE: this issue was originally incorrectly mapped to CVE-2014-1155; see CVE-2014-1155 for more information.

CVE-2014-9567 projectsend vulnerability CVSS: 7.5 07 Jan 2015, 18:59 UTC

Unrestricted file upload vulnerability in process-upload.php in ProjectSend (formerly cFTP) r100 through r561 allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in the upload/files/ or upload/temp/ directory.