Home

Description

A flaw has been found in projectsend up to r1945. This impacts an unknown function of the file includes/Classes/Auth.php. Executing a manipulation of the argument ldap_email can lead to observable response discrepancy. The attack can be executed remotely. A high complexity level is associated with this attack. The exploitability is said to be difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2026-03-12 | Published 2026-03-12 | Updated 2026-03-12 | Assigner VulDB




MEDIUM: 6.3CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 3.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
LOW: 3.7CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
2.6AV:N/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR

Problem types

Observable Response Discrepancy

Information Exposure Through Discrepancy

Timeline

2026-03-12:Advisory disclosed
2026-03-12:VulDB entry created
2026-03-12:VulDB entry last update

Credits

0xNayel (VulDB User) reporter

VulDB coordinator

References

vuldb.com/?id.350657 (VDB-350657 | projectsend Auth.php response discrepancy) vdb-entry technical-description

vuldb.com/?ctiid.350657 (VDB-350657 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.769577 (Submit #769577 | projectsend 35dfd6f08f7d517709c77ee73e57367141107e6b LDAP Injection) third-party-advisory

drive.google.com/...2ykx0yXpATPmsPgJxIxOrWb/view?usp=sharing exploit

cve.org (CVE-2026-4045)

nvd.nist.gov (CVE-2026-4045)

Download JSON