CVE-2026-5624
ProjectSend upload.php cross-site request forgery
CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
4th
A security flaw has been discovered in ProjectSend r2002. This vulnerability affects unknown code of the file upload.php. Performing a manipulation results in cross-site request forgery. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. Upgrading to version r2029 is able to resolve this issue. The patch is named 2c0d25824ab571b6c219ac1a188ad9350149661b. You should upgrade the affected component.
| CWE | CWE-352 CWE-862 |
| Vendor | n/a |
| Product | projectsend |
| Published | Apr 6, 2026 |
| Last Updated | Apr 6, 2026 |
Stay Ahead of the Next One
Get instant alerts for n/a projectsend
Be the first to know when new medium vulnerabilities affecting n/a projectsend are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
n/a / ProjectSend
r2002
References
vuldb.com: https://vuldb.com/vuln/355414 vuldb.com: https://vuldb.com/vuln/355414/cti vuldb.com: https://vuldb.com/submit/785731 github.com: https://github.com/projectsend/projectsend/commit/2c0d25824ab571b6c219ac1a188ad9350149661b github.com: https://github.com/projectsend/projectsend/releases/tag/r2029 github.com: https://github.com/projectsend/projectsend/
Credits
๐ AquaNight (VulDB User) VulDB Vulnerability Moderation Team