CVE-2026-3977
projectsend AJAX Endpoints authorization
CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th
A security vulnerability has been detected in projectsend up to r1945. The affected element is an unknown function of the component AJAX Endpoints. The manipulation leads to missing authorization. The attack can be initiated remotely. The identifier of the patch is 35dfd6f08f7d517709c77ee73e57367141107e6b. To fix this issue, it is recommended to deploy a patch.
| CWE | CWE-862 CWE-863 |
| Vendor | n/a |
| Product | projectsend |
| Published | Mar 12, 2026 |
| Last Updated | Mar 12, 2026 |
Stay Ahead of the Next One
Get instant alerts for n/a projectsend
Be the first to know when new medium vulnerabilities affecting n/a projectsend are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
n/a / projectsend
r1945
References
vuldb.com: https://vuldb.com/?id.350412 vuldb.com: https://vuldb.com/?ctiid.350412 github.com: https://github.com/projectsend/projectsend/issues/1525 github.com: https://github.com/projectsend/projectsend/issues/1525#issuecomment-3957109914 github.com: https://github.com/projectsend/projectsend/commit/35dfd6f08f7d517709c77ee73e57367141107e6b github.com: https://github.com/projectsend/projectsend/
Credits
VulDB GitHub Commit Analyzer