{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4044","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-12T09:07:40.791Z","datePublished":"2026-03-12T15:32:11.910Z","dateUpdated":"2026-03-12T15:40:19.925Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-12T15:32:11.910Z"},"title":"projectsend Delete import-orphans.php realpath path traversal","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"Path Traversal"}]}],"affected":[{"vendor":"n/a","product":"projectsend","versions":[{"version":"r1945","status":"affected"}],"cpes":["cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:*"],"modules":["Delete Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in projectsend up to r1945. This affects the function realpath of the file /import-orphans.php of the component Delete Handler. Performing a manipulation of the argument files[] results in path traversal. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:C","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:C","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4.7,"vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:P/E:POC/RL:ND/RC:C"}}],"timeline":[{"time":"2026-03-12T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-12T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-12T10:13:35.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"0xNayel (VulDB User)","type":"reporter"},{"lang":"en","value":"VulDB","type":"coordinator"}],"references":[{"url":"https://vuldb.com/?id.350656","name":"VDB-350656 | projectsend Delete import-orphans.php realpath path traversal","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.350656","name":"VDB-350656 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.769528","name":"Submit #769528 | projectsend 35dfd6f08f7d517709c77ee73e57367141107e6b Path Traversal","tags":["third-party-advisory"]},{"url":"https://drive.google.com/file/d/1BOWm9FvhmM90oP91rOWpI4GoWdbI06wg/view?usp=sharing","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-12T15:40:11.075051Z","id":"CVE-2026-4044","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-12T15:40:19.925Z"}}]}}