ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 08:15:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Wed, 24 Sep 2025 22:00:00 +0900

Type Values Removed Values Added
Weaknesses CWE-863

Wed, 24 Sep 2025 01:30:00 +0900

Type Values Removed Values Added
Weaknesses CWE-287

Wed, 24 Sep 2025 00:30:00 +0900

Type Values Removed Values Added
Weaknesses CWE-306

Tue, 15 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.93609}

epss

{'score': 0.93112}


Sat, 07 Dec 2024 04:00:00 +0900

Type Values Removed Values Added
Weaknesses CWE-863

Wed, 04 Dec 2024 03:15:00 +0900

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2024-12-03'}


Wed, 04 Dec 2024 01:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 27 Nov 2024 00:15:00 +0900

Type Values Removed Values Added
First Time appeared Projectsend
Projectsend projectsend
CPEs cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:*
Vendors & Products Projectsend
Projectsend projectsend
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 26 Nov 2024 19:00:00 +0900

Type Values Removed Values Added
Description ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
Title ProjectSend Unauthenticated Configuration Modification
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-11-22T12:24:39.978Z

Reserved: 2024-11-25T15:03:30.218Z

Link: CVE-2024-11680

cve-icon Vulnrichment

Updated: 2024-11-26T14:19:04.072Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-26T10:15:04.540

Modified: 2025-10-31T21:56:27.440

Link: CVE-2024-11680

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses