CVE-2026-3664
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to read sensitive data from memory by manipulating how the software processes encrypted XLSX files. However, the attack can only be carried out locally, meaning the attacker needs access to the system where the software is running.
Technical Description
A vulnerability was determined in xlnt-community xlnt up to 1.6.1. Impacted is the function xlnt::detail::compound_document::read_directory of the file source/detail/cryptography/compound_document.cpp of the component Encrypted XLSX File Parser. Executing a manipulation can lead to out-of-bounds read. The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. This patch is called 147. Applying a patch is advised to resolve this issue.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 7, 2026
about 1 month ago
Last Modified
Mar 10, 2026
28 days ago
Vendor
xlnt-community
Product
xlnt
Related Vulnerabilities
This vulnerability allows an attacker to crash the xlnt application by causing it to access a part of memory that doesn't exist, leading to a program failure. The attacker must have local access to the system to exploit this issue, and there are publicly available methods to do so.
This vulnerability allows an attacker with local access to read beyond the intended limits of memory in the xlnt XLSX file parser, potentially exposing sensitive information. It is important to apply the provided patch to fix this issue, as the exploit has already been made public.