CVE-2025-13232: Cross Site Scripting in projectsend
A flaw has been found in projectsend up to r1720. Impacted is an unknown function of the component File Editor/Custom Download Aliases. This manipulation causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. Upgrading to version r1945 is recommended to address this issue. Patch name: 334da1ea39cb12f6b6e98dd2f80bb033e0c7b845. It is advisable to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-13232 is a cross-site scripting vulnerability identified in projectsend, an open-source file sharing application, affecting versions up to r1720. The vulnerability resides in an unspecified function within the File Editor/Custom Download Aliases component, allowing attackers to inject malicious scripts remotely. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but does require user interaction (UI:P). The vulnerability does not compromise confidentiality or availability significantly but has limited impact on integrity (VI:L). Exploitation involves tricking users into interacting with crafted content that executes arbitrary JavaScript in their browsers, potentially leading to session hijacking, defacement, or redirection to malicious sites. Although no exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The recommended mitigation is upgrading to projectsend version r1945, which contains the patch identified by commit 334da1ea39cb12f6b6e98dd2f80bb033e0c7b845. Organizations relying on projectsend for secure file transfers should apply this update promptly to prevent exploitation. The vulnerability's medium CVSS score (5.1) reflects its moderate risk profile, balancing ease of attack with limited impact scope.
Potential Impact
For European organizations, the impact of CVE-2025-13232 primarily concerns the integrity and confidentiality of user sessions and data accessed via projectsend. Successful exploitation could allow attackers to execute malicious scripts in the context of authenticated users, potentially leading to session hijacking, credential theft, or unauthorized actions within the application. This could compromise sensitive file transfers and internal communications, especially in sectors handling confidential or regulated data such as finance, healthcare, and government. While availability is not directly affected, reputational damage and loss of trust may result from exploitation. The risk is heightened for organizations with remote or hybrid workforces relying on projectsend for file sharing. Given the public availability of an exploit, attackers may target vulnerable installations to gain footholds or pivot within networks. Prompt patching is essential to mitigate these risks and maintain compliance with data protection regulations like GDPR.
Mitigation Recommendations
1. Upgrade projectsend installations immediately to version r1945 or later, which contains the fix for CVE-2025-13232. 2. Implement strict input validation and output encoding on all user-supplied data, particularly in the File Editor/Custom Download Aliases component, to prevent script injection. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing projectsend. 4. Conduct regular security audits and penetration testing focused on web application vulnerabilities, including XSS. 5. Educate users about the risks of interacting with suspicious links or content within projectsend interfaces. 6. Monitor web server and application logs for unusual activity indicative of attempted XSS exploitation. 7. Isolate projectsend deployments within segmented network zones to limit lateral movement if compromised. 8. Ensure multi-factor authentication is enabled for projectsend access to reduce the impact of session hijacking.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-13232: Cross Site Scripting in projectsend
Description
A flaw has been found in projectsend up to r1720. Impacted is an unknown function of the component File Editor/Custom Download Aliases. This manipulation causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. Upgrading to version r1945 is recommended to address this issue. Patch name: 334da1ea39cb12f6b6e98dd2f80bb033e0c7b845. It is advisable to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-13232 is a cross-site scripting vulnerability identified in projectsend, an open-source file sharing application, affecting versions up to r1720. The vulnerability resides in an unspecified function within the File Editor/Custom Download Aliases component, allowing attackers to inject malicious scripts remotely. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but does require user interaction (UI:P). The vulnerability does not compromise confidentiality or availability significantly but has limited impact on integrity (VI:L). Exploitation involves tricking users into interacting with crafted content that executes arbitrary JavaScript in their browsers, potentially leading to session hijacking, defacement, or redirection to malicious sites. Although no exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The recommended mitigation is upgrading to projectsend version r1945, which contains the patch identified by commit 334da1ea39cb12f6b6e98dd2f80bb033e0c7b845. Organizations relying on projectsend for secure file transfers should apply this update promptly to prevent exploitation. The vulnerability's medium CVSS score (5.1) reflects its moderate risk profile, balancing ease of attack with limited impact scope.
Potential Impact
For European organizations, the impact of CVE-2025-13232 primarily concerns the integrity and confidentiality of user sessions and data accessed via projectsend. Successful exploitation could allow attackers to execute malicious scripts in the context of authenticated users, potentially leading to session hijacking, credential theft, or unauthorized actions within the application. This could compromise sensitive file transfers and internal communications, especially in sectors handling confidential or regulated data such as finance, healthcare, and government. While availability is not directly affected, reputational damage and loss of trust may result from exploitation. The risk is heightened for organizations with remote or hybrid workforces relying on projectsend for file sharing. Given the public availability of an exploit, attackers may target vulnerable installations to gain footholds or pivot within networks. Prompt patching is essential to mitigate these risks and maintain compliance with data protection regulations like GDPR.
Mitigation Recommendations
1. Upgrade projectsend installations immediately to version r1945 or later, which contains the fix for CVE-2025-13232. 2. Implement strict input validation and output encoding on all user-supplied data, particularly in the File Editor/Custom Download Aliases component, to prevent script injection. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing projectsend. 4. Conduct regular security audits and penetration testing focused on web application vulnerabilities, including XSS. 5. Educate users about the risks of interacting with suspicious links or content within projectsend interfaces. 6. Monitor web server and application logs for unusual activity indicative of attempted XSS exploitation. 7. Isolate projectsend deployments within segmented network zones to limit lateral movement if compromised. 8. Ensure multi-factor authentication is enabled for projectsend access to reduce the impact of session hijacking.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-15T06:24:38.196Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691925d1b279ec11778c28a3
Added to database: 11/16/2025, 1:16:01 AM
Last enriched: 11/16/2025, 1:30:51 AM
Last updated: 11/16/2025, 3:43:30 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13234: SQL Injection in itsourcecode Inventory Management System
MediumCVE-2025-13233: SQL Injection in itsourcecode Inventory Management System
MediumMultiple Vulnerabilities in GoSign Desktop lead to Remote Code Execution
MediumCVE-2025-2448
UnknownCVE-2025-13221: Unprotected Storage of Credentials in Intelbras UnniTI
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.