CVE-2026-3665

A vulnerability was identified in xlnt-community xlnt up to 1.6.1. The affected element is the function xlnt::detail::xlsx_consumer::read_office_document of the file source/detail/serialization/xlsx_consumer.cpp of the component XLSX File Parser. The manipulation leads to null pointer dereference. The attack must be carried out locally. The exploit is publicly available and might be used.
References
Link Resource
https://github.com/oneafter/0128/blob/main/xl4/repro Exploit
https://github.com/xlnt-community/xlnt/ Product
https://github.com/xlnt-community/xlnt/issues/140 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.349554 Permissions Required VDB Entry
https://vuldb.com/?id.349554 Third Party Advisory VDB Entry
https://vuldb.com/?submit.764647 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:xlnt-community:xlnt:*:*:*:*:*:*:*:*

History

10 Mar 2026, 20:37

Type Values Removed Values Added
References () https://github.com/oneafter/0128/blob/main/xl4/repro - () https://github.com/oneafter/0128/blob/main/xl4/repro - Exploit
References () https://github.com/xlnt-community/xlnt/ - () https://github.com/xlnt-community/xlnt/ - Product
References () https://github.com/xlnt-community/xlnt/issues/140 - () https://github.com/xlnt-community/xlnt/issues/140 - Exploit, Issue Tracking, Vendor Advisory
References () https://vuldb.com/?ctiid.349554 - () https://vuldb.com/?ctiid.349554 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.349554 - () https://vuldb.com/?id.349554 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.764647 - () https://vuldb.com/?submit.764647 - Third Party Advisory, VDB Entry
Summary
  • (es) Una vulnerabilidad fue identificada en xlnt-community xlnt hasta 1.6.1. El elemento afectado es la función xlnt::detail::xlsx_consumer::read_office_document del archivo source/detail/serialization/xlsx_consumer.cpp del componente Analizador de Archivos XLSX. La manipulación conduce a desreferencia de puntero nulo. El ataque debe llevarse a cabo localmente. El exploit está disponible públicamente y podría ser utilizado.
First Time Xlnt-community xlnt
Xlnt-community
CPE cpe:2.3:a:xlnt-community:xlnt:*:*:*:*:*:*:*:*

07 Mar 2026, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-07 16:15

Updated : 2026-03-10 20:37


NVD link : CVE-2026-3665

Mitre link : CVE-2026-3665

CVE.ORG link : CVE-2026-3665


JSON object : View

Products Affected

xlnt-community

  • xlnt
CWE
CWE-404

Improper Resource Shutdown or Release

CWE-476

NULL Pointer Dereference