ProjectSend r1605 contains an insecure direct object reference vulnerability that allows unauthenticated attackers to download private files by manipulating the download ID parameter. Attackers can access any user's private files by changing the 'id' parameter in the download request to process.php.
History

Thu, 18 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Projectsend
Projectsend projectsend
Vendors & Products Projectsend
Projectsend projectsend

Wed, 17 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
Description ProjectSend r1605 contains an insecure direct object reference vulnerability that allows unauthenticated attackers to download private files by manipulating the download ID parameter. Attackers can access any user's private files by changing the 'id' parameter in the download request to process.php.
Title ProjectSend r1605 Insecure Direct Object Reference File Download Vulnerability
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-12-17T22:44:57.996Z

Updated: 2025-12-18T15:02:09.609Z

Reserved: 2025-12-16T19:22:09.996Z

Link: CVE-2023-53930

cve-icon Vulnrichment

Updated: 2025-12-18T14:47:55.632Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-17T23:15:52.500

Modified: 2025-12-18T15:15:51.740

Link: CVE-2023-53930

cve-icon Redhat

No data.