Description
ProjectSend r1605 contains a remote code execution vulnerability that allows attackers to upload malicious files by manipulating file extensions. Attackers can upload shell scripts with disguised extensions through the upload.process.php endpoint to execute arbitrary commands on the server.
Problem types
Unrestricted Upload of File with Dangerous Type
Product status
Credits
Mirabbas Ağalarov
References
www.exploit-db.com/exploits/51238
www.exploit-db.com/exploits/51238 (ExploitDB-51238)
www.projectsend.org/ (Official Product Homepage)
www.vulncheck.com/...ecution-via-file-extension-manipulation (VulnCheck Advisory: ProjectSend r1605 Remote Code Execution via File Extension Manipulation)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.