Description
A vulnerability was determined in xlnt-community xlnt up to 1.6.1. Impacted is the function xlnt::detail::compound_document::read_directory of the file source/detail/cryptography/compound_document.cpp of the component Encrypted XLSX File Parser. Executing a manipulation can lead to out-of-bounds read. The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. This patch is called 147. Applying a patch is advised to resolve this issue.
Published: 2026-03-07
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local out-of-bounds read
Action: Apply patch
AI Analysis

Impact

The defect resides in xlnt-community’s xlnt library, specifically in the Encrypted XLSX File Parser’s read_directory routine in compound_document.cpp. An attacker who can craft malicious input files can trigger a read that goes beyond the intended buffer boundaries. The result is not code execution or privilege escalation; instead it can expose data that resides in memory adjacent to the buffer. The flaw is a classic out‑of‑bounds read identified by CWE‑119 and CWE‑125.

Affected Systems

All releases of xlnt up to and including version 1.6.1 are vulnerable. The issue is confined to the cryptography component that processes encrypted XLSX files. No later versions were mentioned, and the vulnerability is not present in releases newer than 1.6.1.

Risk and Exploitability

The CVSS score is 4.8, indicating moderate severity. EPSS is less than 1 %, suggesting a low probability of exploitation at the current time. The flaw is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires local execution, and the vulnerability has been publicly disclosed. Consequently, only users with local access to an application that uses xlnt are at risk.

Generated by OpenCVE AI on April 16, 2026 at 10:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch introduced in pull request 147, which corrects the out‑of‑bounds read in compound_document.cpp.
  • Upgrade the xlnt library to version 1.6.2 or later, where the issue has been resolved.
  • If an immediate upgrade is infeasible, tighten local access controls for software that loads xlnt, ensuring only the least privilege users can supply or open encrypted XLSX files.

Generated by OpenCVE AI on April 16, 2026 at 10:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:xlnt-community:xlnt:*:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Xlnt-community
Xlnt-community xlnt
Vendors & Products Xlnt-community
Xlnt-community xlnt

Sat, 07 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in xlnt-community xlnt up to 1.6.1. Impacted is the function xlnt::detail::compound_document::read_directory of the file source/detail/cryptography/compound_document.cpp of the component Encrypted XLSX File Parser. Executing a manipulation can lead to out-of-bounds read. The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. This patch is called 147. Applying a patch is advised to resolve this issue.
Title xlnt-community xlnt Encrypted XLSX File compound_document.cpp read_directory out-of-bounds
Weaknesses CWE-119
CWE-125
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Xlnt-community Xlnt
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T16:29:17.998Z

Reserved: 2026-03-06T20:34:45.441Z

Link: CVE-2026-3664

cve-icon Vulnrichment

Updated: 2026-03-11T16:14:51.612Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T15:15:56.240

Modified: 2026-03-10T20:30:16.937

Link: CVE-2026-3664

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:00:10Z

Weaknesses