Impact
Projectsend r1295 stores the value of the 'name' parameter from files‑edit.php without proper sanitization, allowing an authenticated attacker to inject JavaScript that executes whenever the file is viewed. The weakness is identified as CWE‑79.
Affected Systems
The vulnerability affects installations of Projectsend in the r1295 release. No additional version ranges are specified.
Risk and Exploitability
The CVSS score of 5.1 indicates medium impact. EPSS is not available, so the exact exploitation probability cannot be quantified, and the vulnerability is not listed in the CISA KEV catalog. Attackers must be authenticated to submit the malicious file name, but once the payload is stored it will run in any user’s browser that accesses the file—particularly System Administrator users on the Dashboard page.
OpenCVE Enrichment