Impact
A vulnerability exists in the xlnt library’s base64 decoding routine used for encrypted XLSX files. The off‑by‑one error can corrupt memory when processing a malformed input, which may allow an attacker with local access to trigger crashes or potentially execute arbitrary code. The weakness is classified as an integer truncation (CWE‑189) and an off‑by‑one index error (CWE‑193).
Affected Systems
The issue affects xlnt-community’s xlnt library up to version 1.6.1. The patch addressing the defect is referenced by commit f2d7bf494e5c52706843cf7eb9892821bffb0734 and is available in subsequent releases. Systems that compile or link against versions prior to the patch are vulnerable.
Risk and Exploitability
The CVSS score of 4.8 reflects moderate severity, and the EPSS score of below 1% suggests a very low likelihood of exploitation. The defect is not listed in the CISA KEV catalog. Exploitation requires local access to the machine running the vulnerable library; an attacker would need to deliver a specially crafted XLSX file to a process that uses xlnt. Because the flaw can trigger memory corruption, a successful exploit could elevate privileges or run arbitrary code on the local host.
OpenCVE Enrichment