CVE-2024-45290

HIGH

PHPSpreadsheet - XSS

Title source: llm
STIX 2.1

Description

PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. It's possible for an attacker to construct an XLSX file which links media from external URLs. When opening the XLSX file, PhpSpreadsheet retrieves the image size and type by reading the file contents, if the provided path is a URL. By using specially crafted `php://filter` URLs an attacker can leak the contents of any file or URL. Note that this vulnerability is different from GHSA-w9xv-qf98-ccq4, and resides in a different component. An attacker can access any file on the server, or leak information form arbitrary URLs, potentially exposing sensitive information such as AWS IAM credentials. This issue has been addressed in release versions 1.29.2, 2.1.1, and 2.3.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.

Scores

CVSS v3 7.7
EPSS 0.0031
EPSS Percentile 53.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-36 CWE-918
Status published
Products (3)
phpoffice/phpexcel 0Packagist
phpoffice/phpspreadsheet < 1.29.2
phpoffice/phpspreadsheet 2.2.0 - 2.3.0Packagist
Published Oct 07, 2024
Tracked Since Feb 18, 2026