ProjectSend r1605 contains an insecure direct object reference vulnerability that allows unauthenticated attackers to download private files by manipulating the download ID parameter. Attackers can access any user's private files by changing the 'id' parameter in the download request to process.php.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 17 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
Description ProjectSend r1605 contains an insecure direct object reference vulnerability that allows unauthenticated attackers to download private files by manipulating the download ID parameter. Attackers can access any user's private files by changing the 'id' parameter in the download request to process.php.
Title ProjectSend r1605 Insecure Direct Object Reference File Download Vulnerability
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-17T22:44:57.996Z

Reserved: 2025-12-16T19:22:09.996Z

Link: CVE-2023-53930

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-12-17T23:15:52.500

Modified: 2025-12-17T23:15:52.500

Link: CVE-2023-53930

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses