๐Ÿ” CVE Alert

CVE-2021-47947

MEDIUM 6.4

Projectsend r1295 Stored Cross-Site Scripting via files-edit.php

CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th

Projectsend r1295 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts by submitting crafted input in the 'name' parameter of files-edit.php. Attackers can inject JavaScript payloads through the file name field that execute in the browser when the file is viewed by other users, particularly affecting System Administrator users on the Dashboard page.

CWE CWE-79
Vendor projectsend
Product projectsend
Published May 10, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for projectsend projectsend

Be the first to know when new medium vulnerabilities affecting projectsend projectsend are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
None

Affected Versions

Projectsend / Projectsend
r1295

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/50240 projectsend.org: https://www.projectsend.org/ projectsend.org: https://www.projectsend.org/download/387/ vulncheck.com: https://www.vulncheck.com/advisories/projectsend-r1295-stored-cross-site-scripting-via-files-edit-php

Credits

Abdullah Kala