Impact
The vulnerability is an improper neutralization of formula elements in CSV data, resulting in the injection of spreadsheet formulas when a chat history is exported from the application. If an attacker can include strings that begin with Excel formula characters in the chat content, the exported .xlsx file will contain executable formulas. When an administrative user opens that file in a spreadsheet program such as Microsoft Excel, dynamic data exchange can trigger arbitrary code execution on the workstation. The weakness aligns with CWE‑1236 and potentially compromises the confidentiality, integrity, and availability of the administrator’s system.
Affected Systems
The affected product is 1Panel‑dev’s MaxKB, an open‑source AI assistant used by enterprises. Versions 2.7.1 and earlier are vulnerable; the issue was resolved in the 2.8.0 release. The export operation is performed via the /admin/api/workspace/{workspace_id}/application/{application_id}/chat/export endpoint.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. While EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog, the likely attack vector requires the administrator to accept and open the maliciously crafted .xlsx file. An attacker who can influence chat content—such as an external user or a compromised account—can place harmful formulas into the export. Exploitation is therefore possible in environments where users export chat logs without sanitization and use spreadsheet applications that interpret formulas. Overall risk is moderate but could be higher in organizations that use legacy or unpatched systems.
OpenCVE Enrichment