ProjectSend r1605 contains an insecure direct object reference vulnerability that allows unauthenticated attackers to download private files by manipulating the download ID parameter. Attackers can access any user's private files by changing the 'id' parameter in the download request to process.php.
History

Thu, 18 Dec 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Projectsend
Projectsend projectsend
Vendors & Products Projectsend
Projectsend projectsend

Wed, 17 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
Description ProjectSend r1605 contains an insecure direct object reference vulnerability that allows unauthenticated attackers to download private files by manipulating the download ID parameter. Attackers can access any user's private files by changing the 'id' parameter in the download request to process.php.
Title ProjectSend r1605 Insecure Direct Object Reference File Download Vulnerability
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-17T22:44:57.996Z

Reserved: 2025-12-16T19:22:09.996Z

Link: CVE-2023-53930

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-17T23:15:52.500

Modified: 2025-12-17T23:15:52.500

Link: CVE-2023-53930

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-18T09:56:20Z