🔐 CVE Alert

CVE-2023-53905

HIGH 8.0

ProjectSend r1605 CSV Injection via User Account Export Functionality

CVSS Score
8.0
EPSS Score
0.0%
EPSS Percentile
0th

ProjectSend r1605 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into user profile names. Attackers can craft payloads like =calc|a!z| in the name field to trigger code execution when administrators export action logs as CSV files.

CWE CWE-1236
Vendor projectsend
Product projectsend
Published Dec 17, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for projectsend projectsend

Be the first to know when new high vulnerabilities affecting projectsend projectsend are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

projectSend / projectSend
r1605

References

NVD ↗ CVE.org ↗ EPSS Data ↗
exploit-db.com: https://www.exploit-db.com/exploits/51517 projectsend.org: https://www.projectsend.org/ vulncheck.com: https://www.vulncheck.com/advisories/projectsend-csv-injection-via-user-account-export-functionality

Credits

Mirabbas Ağalarov