๐Ÿ” CVE Alert

CVE-2026-5624

MEDIUM 4.3

ProjectSend upload.php cross-site request forgery

CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
4th

A security flaw has been discovered in ProjectSend r2002. This vulnerability affects unknown code of the file upload.php. Performing a manipulation results in cross-site request forgery. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. Upgrading to version r2029 is able to resolve this issue. The patch is named 2c0d25824ab571b6c219ac1a188ad9350149661b. You should upgrade the affected component.

CWE CWE-352 CWE-862
Vendor n/a
Product projectsend
Published Apr 6, 2026
Last Updated Apr 6, 2026
Stay Ahead of the Next One

Get instant alerts for n/a projectsend

Be the first to know when new medium vulnerabilities affecting n/a projectsend are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

n/a / ProjectSend
r2002

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/355414 vuldb.com: https://vuldb.com/vuln/355414/cti vuldb.com: https://vuldb.com/submit/785731 github.com: https://github.com/projectsend/projectsend/commit/2c0d25824ab571b6c219ac1a188ad9350149661b github.com: https://github.com/projectsend/projectsend/releases/tag/r2029 github.com: https://github.com/projectsend/projectsend/

Credits

๐Ÿ” AquaNight (VulDB User) VulDB Vulnerability Moderation Team