ProjectSend: The Unpatched Comedy of Errors – 55% Still Vulnerable!

VulnCheck warns that ProjectSend servers are being exploited due to an unpatched vulnerability, CVE-2024-11680. Described as an improper authentication flaw, it lets attackers create rogue accounts and execute malicious code. Despite a patch, most servers remain unprotected, making exploitation widespread—like a party where only hackers RSVP’d.

Pro Dashboard

Hot Take:

This is why you should never underestimate the power of procrastination. It seems like ProjectSend admins are in a race to see who can avoid patching their servers the longest. Who knew that “I’ll do it tomorrow” could be so enticing to hackers?

Key Points:

  • ProjectSend servers are being exploited due to an unpatched vulnerability from 2023.
  • The issue, CVE-2024-11680, is an improper authentication flaw with a CVSS score of 9.8.
  • Exploitation allows attackers to modify configurations and execute arbitrary PHP code.
  • Despite available patches, 99% of servers haven’t updated, leaving them at risk.
  • VulnCheck reports widespread exploitation and a significant lack of patch adoption.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?