CVE & Exploit Intelligence Database

Updated 26m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

337,123 CVEs tracked 53,223 with exploits 4,686 exploited in wild 1,539 CISA KEV 3,912 Nuclei templates 37,757 vendors 42,429 researchers
280 results Clear all
CVE-2026-24447 6.5 MEDIUM EPSS 0.00
Movable Type - Code Injection
If a malformed data is input to the affected product, a CSV file downloaded from the affected product may contain such malformed data. When a victim user download and open such a CSV file, the embedded code may be executed in the user's environment. Note that Movable Type 7 series and 8.4 series, which are End-of-Life (EOL), are affected by the vulnerability as well.
CWE-1236 Feb 04, 2026
CVE-2025-67851 6.1 MEDIUM EPSS 0.00
Moodle - Code Injection
A flaw was found in moodle. This formula injection vulnerability occurs when data fields are exported without proper escaping. A remote attacker could exploit this by providing malicious data that, when exported and opened in a spreadsheet, allows arbitrary formulas to execute. This can lead to compromised data integrity and unintended operations within the spreadsheet.
CWE-1236 Feb 03, 2026
CVE-2020-36962 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Tendenci 12.3.1 - Code Injection
Tendenci 12.3.1 contains a CSV formula injection vulnerability in the contact form message field that allows attackers to inject malicious formulas during export. Attackers can submit crafted payloads like '=10+20+cmd|' /C calc'!A0' in the message field to trigger arbitrary command execution when the CSV is opened in spreadsheet applications.
CWE-1236 Jan 28, 2026
CVE-2021-47901 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Dirsearch 0.4.1 - Code Injection
Dirsearch 0.4.1 contains a CSV injection vulnerability when using the --csv-report flag that allows attackers to inject formulas through redirected endpoints. Attackers can craft malicious server redirects with comma-separated paths containing Excel formulas to manipulate the generated CSV report.
CWE-1236 Jan 27, 2026
CVE-2020-36941 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Knockpy 4.1.1 - Code Injection
Knockpy 4.1.1 contains a CSV injection vulnerability that allows attackers to inject malicious formulas into CSV reports through unfiltered server headers. Attackers can manipulate server response headers to include spreadsheet formulas that will execute when the CSV is opened in spreadsheet applications.
CWE-1236 Jan 27, 2026
CVE-2026-23873 9.0 CRITICAL EPSS 0.00
hustoj - CSV Injection
hustoj is an open source online judge based on PHP/C++/MySQL/Linux for ACM/ICPC and NOIP training. All versions are vulnerable to CSV Injection (Formula Injection) through the contest rank export functionality (contestrank.xls.php and admin/ranklist_export.php). The application fails to sanitize user-supplied input (specifically the "Nickname" field) before exporting it to an .xls file (which renders as an HTML table but is opened by Excel). If a malicious user sets their nickname to an Excel formula when an administrator exports and opens the rank list in Microsoft Excel, the formula will be executed. This can lead to arbitrary command execution (RCE) on the administrator's machine or data exfiltration. A fix was not available at the time of publication.
CWE-1236 Jan 22, 2026
CVE-2025-61873 2.6 LOW EPSS 0.00
Best Practical RT <4.4.9-6.0.2 - Code Injection
Best Practical Request Tracker (RT) before 4.4.9, 5.0.9, and 6.0.2 allows CSV Injection via ticket values when TSV export is used.
CWE-1236 Jan 16, 2026
CVE-2025-66834 7.3 HIGH 1 Writeup EPSS 0.00
TrueConf Server <5.5.2.10813 - Formula Injection
A CSV Formula Injection vulnerability in TrueConf Server v5.5.2.10813 allows a normal user to inject malicious spreadsheet formulas into exported chat logs via crafted Display Name.
CWE-1236 Dec 30, 2025
CVE-2023-53929 8.8 HIGH 1 PoC Analysis EPSS 0.00
phpMyFAQ 3.1.12 - Code Injection
phpMyFAQ 3.1.12 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into their profile names. Attackers can modify their user profile name with a payload like 'calc|a!z|' to trigger code execution when an administrator exports user data as a CSV file.
CWE-1236 Dec 17, 2025
CVE-2023-53913 8.8 HIGH 1 PoC Analysis EPSS 0.00
Rukovoditel 3.3.1 - Code Injection
Rukovoditel 3.3.1 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into the firstname field. Attackers can craft payloads like =calc|a!z| to trigger code execution when an admin exports customer data as a CSV file.
CWE-1236 Dec 17, 2025
CVE-2023-53905 8.0 HIGH 1 PoC Analysis EPSS 0.00
ProjectSend r1605 - Code Injection
ProjectSend r1605 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into user profile names. Attackers can craft payloads like =calc|a!z| in the name field to trigger code execution when administrators export action logs as CSV files.
CWE-1236 Dec 17, 2025
CVE-2025-14229 4.7 MEDIUM EPSS 0.00
SourceCodester Inventory Management System 1.0 - Code Injection
A security vulnerability has been detected in SourceCodester Inventory Management System 1.0. The affected element is an unknown function of the component SVC Report Export. Such manipulation leads to csv injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
CWE-74 Dec 08, 2025
CVE-2025-51735 7.5 HIGH EPSS 0.00
HCL Technologies Ltd. Unica 12.0.0. - Code Injection
CSV formula injection vulnerability in HCL Technologies Ltd. Unica 12.0.0.
CWE-1236 Nov 28, 2025
CVE-2025-13133 6.6 MEDIUM EPSS 0.00
Simple User Import Export <1.1.7 - Code Injection
The Simple User Import Export plugin for WordPress is vulnerable to CSV Injection in all versions up to, and including, 1.1.7 via the 'Import/export users' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration
CWE-1236 Nov 18, 2025
CVE-2025-12249 6.3 MEDIUM EPSS 0.00
Axosoft Scrum and Bug Tracking 22.1.1.11545 - Code Injection
A vulnerability was detected in Axosoft Scrum and Bug Tracking 22.1.1.11545. The impacted element is an unknown function of the component Edit Ticket Page. Performing manipulation of the argument Title results in csv injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-74 Oct 27, 2025
CVE-2025-11576 4.3 MEDIUM EPSS 0.00
AI Chatbot Free Models - Customer Support, Live Chat, Virtual Assis...
The AI Chatbot Free Models – Customer Support, Live Chat, Virtual Assistant plugin for WordPress is vulnerable to CSV Injection in all versions up to, and including, 1.6.5. This is due to insufficient sanitization in the 'newcodebyte_chatbot_export_messages' function. This makes it possible for unauthenticated attackers to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
CWE-1236 Oct 24, 2025
CVE-2025-60852 6.5 MEDIUM 2 PoCs Analysis EPSS 0.00
Instant Developer Foundation <25.0.9600 - Code Injection
A CSV Injection vulnerability existed in Instant Developer Foundation versions prior to 25.0.9600. Applications built with affected versions of the framework did not properly sanitize user-controlled input before including it in CSV exports. This issue could lead to code execution on the system where the exported CSV file is opened.
CWE-1236 Oct 23, 2025
CVE-2025-62417 7.8 HIGH EPSS 0.00
Bagisto - Info Disclosure
Bagisto is an open source laravel eCommerce platform. When product data that begins with a spreadsheet formula character (for example =, +, -, or @) is accepted and later exported or saved into a CSV and opened in spreadsheet software, the spreadsheet will interpret that cell as a formula. This allows an attacker to supply a CSV field (e.g., product name) that contains a formula which may be evaluated by a victim’s spreadsheet application — potentially leading to data exfiltration and remote command execution (via older Excel exploits / OLE/cmd constructs or Excel macros). This vulnerability is fixed in 2.3.8.
CWE-1236 Oct 16, 2025
CVE-2025-11498 6.1 MEDIUM EPSS 0.00
B&R Automation Runtime <6.4 - Info Disclosure
An Improper Neutralization of Formula Elements in a CSV File vulnerability exists in System Diagnostics Manager (SDM) of B&R Automation Runtime versions before 6.4 enabling a remote attacker to inject formula data into a generated CSV file. The exploitation of this vulnerability requires the attacker to create a malicious link. The user would need to click on this link, after which the resulting CSV file addi-tionally needs to be manually opened.
CWE-1236 Oct 14, 2025
CVE-2025-11254 4.3 MEDIUM EPSS 0.00
Contest Gallery <27.0.3 - Code Injection
The Contest Gallery – Upload, Vote & Sell with PayPal and Stripe plugin for WordPress is vulnerable to CSV Injection in all versions up to, and including, 27.0.3 via gallery submissions. This makes it possible for unauthenticated attackers to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
CWE-1236 Oct 11, 2025