CVE-2026-3664

A vulnerability was determined in xlnt-community xlnt up to 1.6.1. Impacted is the function xlnt::detail::compound_document::read_directory of the file source/detail/cryptography/compound_document.cpp of the component Encrypted XLSX File Parser. Executing a manipulation can lead to out-of-bounds read. The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. This patch is called 147. Applying a patch is advised to resolve this issue.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:xlnt-community:xlnt:*:*:*:*:*:*:*:*

History

10 Mar 2026, 20:30

Type Values Removed Values Added
First Time Xlnt-community xlnt
Xlnt-community
References () https://github.com/oneafter/0128/blob/main/xl5/repro - () https://github.com/oneafter/0128/blob/main/xl5/repro - Exploit
References () https://github.com/xlnt-community/xlnt/ - () https://github.com/xlnt-community/xlnt/ - Product
References () https://github.com/xlnt-community/xlnt/issues/141 - () https://github.com/xlnt-community/xlnt/issues/141 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/xlnt-community/xlnt/pull/147 - () https://github.com/xlnt-community/xlnt/pull/147 - Issue Tracking
References () https://vuldb.com/?ctiid.349553 - () https://vuldb.com/?ctiid.349553 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.349553 - () https://vuldb.com/?id.349553 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.764646 - () https://vuldb.com/?submit.764646 - Third Party Advisory, VDB Entry
Summary
  • (es) Se determinó una vulnerabilidad en xlnt-community xlnt hasta 1.6.1. La función xlnt::detail::compound_document::read_directory del archivo source/detail/cryptography/compound_document.cpp del componente Encrypted XLSX File Parser se ve afectada. La ejecución de una manipulación puede llevar a una lectura fuera de límites. El ataque está restringido a la ejecución local. El exploit ha sido divulgado públicamente y puede ser utilizado. Este parche se llama 147. Se aconseja aplicar un parche para resolver este problema.
CPE cpe:2.3:a:xlnt-community:xlnt:*:*:*:*:*:*:*:*

07 Mar 2026, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-07 15:15

Updated : 2026-03-10 20:30


NVD link : CVE-2026-3664

Mitre link : CVE-2026-3664

CVE.ORG link : CVE-2026-3664


JSON object : View

Products Affected

xlnt-community

  • xlnt
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-125

Out-of-bounds Read