CVE-2026-3463

A weakness has been identified in xlnt-community xlnt up to 1.6.1. Impacted is the function xlnt::detail::binary_writer::append of the file source/detail/binary.hpp of the component Compound Document Parser. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been made available to the public and could be used for attacks. Patch name: 147. It is suggested to install a patch to address this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:xlnt-community:xlnt:*:*:*:*:*:*:*:*

History

10 Mar 2026, 20:29

Type Values Removed Values Added
CPE cpe:2.3:a:xlnt-community:xlnt:*:*:*:*:*:*:*:*
Summary
  • (es) Se ha identificado una debilidad en xlnt-community xlnt hasta 1.6.1. La función xlnt::detail::binary_writer::append del archivo source/detail/binary.hpp del componente Analizador de Documentos Compuestos se ve afectada. Esta manipulación causa desbordamiento de búfer basado en montículo. El ataque solo puede ejecutarse localmente. El exploit se ha puesto a disposición del público y podría usarse para ataques. Nombre del parche: 147. Se sugiere instalar un parche para abordar este problema.
First Time Xlnt-community xlnt
Xlnt-community
References () https://github.com/oneafter/0128/blob/main/xl2/repro - () https://github.com/oneafter/0128/blob/main/xl2/repro - Exploit
References () https://github.com/xlnt-community/xlnt/ - () https://github.com/xlnt-community/xlnt/ - Product
References () https://github.com/xlnt-community/xlnt/issues/138 - () https://github.com/xlnt-community/xlnt/issues/138 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/xlnt-community/xlnt/issues/138#issuecomment-3868381672 - () https://github.com/xlnt-community/xlnt/issues/138#issuecomment-3868381672 - Issue Tracking
References () https://github.com/xlnt-community/xlnt/pull/147 - () https://github.com/xlnt-community/xlnt/pull/147 - Issue Tracking
References () https://vuldb.com/?ctiid.348530 - () https://vuldb.com/?ctiid.348530 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.348530 - () https://vuldb.com/?id.348530 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.764643 - () https://vuldb.com/?submit.764643 - Third Party Advisory, VDB Entry

03 Mar 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-03 12:16

Updated : 2026-03-10 20:29


NVD link : CVE-2026-3463

Mitre link : CVE-2026-3463

CVE.ORG link : CVE-2026-3463


JSON object : View

Products Affected

xlnt-community

  • xlnt
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-122

Heap-based Buffer Overflow