Description
A vulnerability was found in xlnt-community xlnt up to 1.6.1. This issue affects the function xlnt::detail::compound_document_istreambuf::xsgetn of the file source/detail/cryptography/compound_document.cpp of the component XLSX File Parser. Performing a manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit has been made public and could be used. The patch is named 147. It is recommended to apply a patch to fix this issue.
Published: 2026-03-07
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure via Out‑of‑Bounds Read
Action: Apply Patch
AI Analysis

Impact

A flaw in the xlnt Excel XLSX parser allows a local user to trigger an out‑of‑bounds read in the compound_document_istreambuf::xsgetn function. The vulnerability is triggered by supplying a specially crafted input file, and it results in reading memory beyond the intended buffer boundaries. This can expose sensitive data stored in adjacent memory, potentially leading to information disclosure. The flaw is classified as a buffer overread (CWE‑119 and CWE‑125).

Affected Systems

The xlnt‑community xlnt library, versions up to and including 1.6.1, is affected. Users integrating this library in any application that parses XLSX files may be vulnerable if they have local file access to the target system. No specific operating system or platform constraints are reported, so the impact is applicable wherever the vulnerable library is deployed.

Risk and Exploitability

The CVSS score of 4.8 indicates moderate severity, and the EPSS score of less than 1% suggests a very low probability of exploitation in the wild at present. The vulnerability is not listed in the CISA KEV catalogue, further indicating limited exploitation evidence. The attack requires local access, which limits the threat surface but still poses risk to environments where the library handles untrusted input locally.

Generated by OpenCVE AI on April 16, 2026 at 10:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade xlnt to version 1.6.2 or later, which includes the fix from pull request 147.
  • If the library cannot be upgraded immediately, merge the changes from PR 147 into your source tree and rebuild the application with the updated code.
  • Restrict local processing of XLSX files to trusted users only or run the parser in a sandboxed environment with limited filesystem access to prevent an attacker from placing a malicious file at a read‑accessible location.

Generated by OpenCVE AI on April 16, 2026 at 10:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:xlnt-community:xlnt:*:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Xlnt-community
Xlnt-community xlnt
Vendors & Products Xlnt-community
Xlnt-community xlnt

Sat, 07 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in xlnt-community xlnt up to 1.6.1. This issue affects the function xlnt::detail::compound_document_istreambuf::xsgetn of the file source/detail/cryptography/compound_document.cpp of the component XLSX File Parser. Performing a manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit has been made public and could be used. The patch is named 147. It is recommended to apply a patch to fix this issue.
Title xlnt-community xlnt XLSX File compound_document.cpp xsgetn out-of-bounds
Weaknesses CWE-119
CWE-125
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Xlnt-community Xlnt
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T16:29:23.238Z

Reserved: 2026-03-06T20:34:39.952Z

Link: CVE-2026-3663

cve-icon Vulnrichment

Updated: 2026-03-11T16:15:17.006Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T15:15:56.020

Modified: 2026-03-10T20:29:26.237

Link: CVE-2026-3663

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:00:10Z

Weaknesses