Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13232: Cross Site Scripting in projectsend

0
Medium
VulnerabilityCVE-2025-13232cvecve-2025-13232
Published: Sun Nov 16 2025 (11/16/2025, 01:02:07 UTC)
Source: CVE Database V5
Product: projectsend

Description

A flaw has been found in projectsend up to r1720. Impacted is an unknown function of the component File Editor/Custom Download Aliases. This manipulation causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. Upgrading to version r1945 is recommended to address this issue. Patch name: 334da1ea39cb12f6b6e98dd2f80bb033e0c7b845. It is advisable to upgrade the affected component.

AI-Powered Analysis

AILast updated: 11/16/2025, 01:30:51 UTC

Technical Analysis

CVE-2025-13232 is a cross-site scripting vulnerability identified in projectsend, an open-source file sharing application, affecting versions up to r1720. The vulnerability resides in an unspecified function within the File Editor/Custom Download Aliases component, allowing attackers to inject malicious scripts remotely. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but does require user interaction (UI:P). The vulnerability does not compromise confidentiality or availability significantly but has limited impact on integrity (VI:L). Exploitation involves tricking users into interacting with crafted content that executes arbitrary JavaScript in their browsers, potentially leading to session hijacking, defacement, or redirection to malicious sites. Although no exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The recommended mitigation is upgrading to projectsend version r1945, which contains the patch identified by commit 334da1ea39cb12f6b6e98dd2f80bb033e0c7b845. Organizations relying on projectsend for secure file transfers should apply this update promptly to prevent exploitation. The vulnerability's medium CVSS score (5.1) reflects its moderate risk profile, balancing ease of attack with limited impact scope.

Potential Impact

For European organizations, the impact of CVE-2025-13232 primarily concerns the integrity and confidentiality of user sessions and data accessed via projectsend. Successful exploitation could allow attackers to execute malicious scripts in the context of authenticated users, potentially leading to session hijacking, credential theft, or unauthorized actions within the application. This could compromise sensitive file transfers and internal communications, especially in sectors handling confidential or regulated data such as finance, healthcare, and government. While availability is not directly affected, reputational damage and loss of trust may result from exploitation. The risk is heightened for organizations with remote or hybrid workforces relying on projectsend for file sharing. Given the public availability of an exploit, attackers may target vulnerable installations to gain footholds or pivot within networks. Prompt patching is essential to mitigate these risks and maintain compliance with data protection regulations like GDPR.

Mitigation Recommendations

1. Upgrade projectsend installations immediately to version r1945 or later, which contains the fix for CVE-2025-13232. 2. Implement strict input validation and output encoding on all user-supplied data, particularly in the File Editor/Custom Download Aliases component, to prevent script injection. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing projectsend. 4. Conduct regular security audits and penetration testing focused on web application vulnerabilities, including XSS. 5. Educate users about the risks of interacting with suspicious links or content within projectsend interfaces. 6. Monitor web server and application logs for unusual activity indicative of attempted XSS exploitation. 7. Isolate projectsend deployments within segmented network zones to limit lateral movement if compromised. 8. Ensure multi-factor authentication is enabled for projectsend access to reduce the impact of session hijacking.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-15T06:24:38.196Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691925d1b279ec11778c28a3

Added to database: 11/16/2025, 1:16:01 AM

Last enriched: 11/16/2025, 1:30:51 AM

Last updated: 11/16/2025, 3:43:30 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats