ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
References
| Link | Resource |
|---|---|
| https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/projectsend-auth-bypass.yaml | Broken Link Third Party Advisory |
| https://github.com/projectsend/projectsend/commit/193367d937b1a59ed5b68dd4e60bd53317473744 | Patch |
| https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/projectsend_unauth_rce.rb | Exploit |
| https://vulncheck.com/advisories/projectsend-bypass | Third Party Advisory |
| https://www.synacktiv.com/sites/default/files/2024-07/synacktiv-projectsend-multiple-vulnerabilities.pdf | Mitigation Technical Description Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-11680 |
Configurations
History
21 Oct 2025, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:19
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/projectsend-auth-bypass.yaml - Broken Link, Third Party Advisory |
24 Sep 2025, 12:56
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | ||
| References | () https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/projectsend-auth-bypass.yaml - Third Party Advisory, Broken Link |
23 Sep 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-306 |
06 Dec 2024, 18:42
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:* | |
| First Time |
Projectsend
Projectsend projectsend |
|
| References | () https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/projectsend-auth-bypass.yaml - Third Party Advisory | |
| References | () https://github.com/projectsend/projectsend/commit/193367d937b1a59ed5b68dd4e60bd53317473744 - Patch | |
| References | () https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/projectsend_unauth_rce.rb - Exploit | |
| References | () https://vulncheck.com/advisories/projectsend-bypass - Third Party Advisory | |
| References | () https://www.synacktiv.com/sites/default/files/2024-07/synacktiv-projectsend-multiple-vulnerabilities.pdf - Mitigation, Technical Description, Third Party Advisory | |
| CWE | CWE-863 |
Information
Published : 2024-11-26 10:15
Updated : 2025-10-21 23:16
NVD link : CVE-2024-11680
Mitre link : CVE-2024-11680
CVE.ORG link : CVE-2024-11680
JSON object : View
Products Affected
projectsend
- projectsend
CWE
CWE-306
Missing Authentication for Critical Function
