CVE-2026-5624
Received Received - Intake
Cross-Site Request Forgery in ProjectSend upload.php (r

Publication date: 2026-04-06

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in ProjectSend r2002. This vulnerability affects unknown code of the file upload.php. Performing a manipulation results in cross-site request forgery. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. Upgrading to version r2029 is able to resolve this issue. The patch is named 2c0d25824ab571b6c219ac1a188ad9350149661b. You should upgrade the affected component.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-06
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
projectsend projectsend r2002
projectsend projectsend From r2029 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-5624 is a security flaw in ProjectSend r2002 affecting the file upload.php component. It is a Cross-Site Request Forgery (CSRF) vulnerability that allows an attacker to trick an authenticated user into unknowingly uploading files by exploiting a bypass in CSRF validation. The vulnerability arises because the upload endpoint accepted parameters from both GET and POST requests and excluded certain requests from CSRF checks, enabling remote attackers to perform unauthorized file uploads.

The issue was fixed by removing the CSRF bypass, enforcing CSRF token validation on every upload chunk, and restricting parameter acceptance strictly to POST requests. This prevents attackers from exploiting the upload functionality without a valid CSRF token.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided context and resources do not contain specific information about how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability impact me? :

This vulnerability can allow attackers to perform unauthorized file uploads on your ProjectSend installation by exploiting an authenticated user's session without their consent. Such unauthorized uploads could lead to the introduction of malicious files, potentially compromising the server or the confidentiality and integrity of your data.

Because the attack can be initiated remotely and without user interaction beyond visiting a malicious page, it increases the risk of exploitation. This could result in unauthorized access, data manipulation, or further attacks leveraging the uploaded files.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves a Cross-Site Request Forgery (CSRF) issue on the file upload endpoint of ProjectSend. Detection would involve monitoring for unauthorized or suspicious POST requests to the upload.php endpoint that lack valid CSRF tokens.

You can detect potential exploitation attempts by inspecting HTTP traffic for POST requests to the file upload endpoint that do not include a valid CSRF token or that use GET parameters instead of POST.

Suggested commands to detect such activity might include using network traffic analysis tools or web server logs filtering. For example:

  • Using tcpdump or tshark to capture HTTP POST requests to upload.php: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'POST /upload.php'
  • Using grep on web server access logs to find requests to upload.php with GET parameters: grep 'upload.php?' /var/log/apache2/access.log
  • Checking for missing CSRF tokens in POST requests might require custom log parsing or application-level logging enhancements.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to upgrade ProjectSend to version r2029 or later, which includes the patch that fixes this CSRF vulnerability.

The patch enforces strict CSRF token validation on all POST requests to the file upload endpoint, removes the previous CSRF bypass, and restricts parameters to be accepted only via POST, thereby preventing unauthorized file uploads.

Additional security improvements in the r2029 release include enhanced cookie security flags and other vulnerability fixes, so upgrading is strongly recommended.

If immediate upgrade is not possible, consider implementing web application firewall (WAF) rules to block suspicious requests to the upload.php endpoint that do not include valid CSRF tokens or that use GET parameters for uploads.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart