CVE-2025-13232

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-13232
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-13232.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-13232
Published
2025-11-16T01:15:42.850Z
Modified
2025-11-20T15:14:36.678024Z
Severity
  • 3.5 (Low) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

A flaw has been found in projectsend up to r1720. Impacted is an unknown function of the component File Editor/Custom Download Aliases. This manipulation causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. Upgrading to version r1945 is recommended to address this issue. Patch name: 334da1ea39cb12f6b6e98dd2f80bb033e0c7b845. It is advisable to upgrade the affected component.

References

Affected packages

Git / github.com/projectsend/projectsend

Affected ranges

Type
GIT
Repo
https://github.com/projectsend/projectsend
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

Other

Stable
r1053
r1070
r1270
r1295
r1335
r1415
r1420
r1584
r1605
r1720
r559
r753
r754
r756