CVE-2019-11819
Description
Alkacon OpenCMS v10.5.4 and before is affected by CSV (aka Excel Macro) Injection in the module New User (/opencms/system/workplace/admin/accounts/user_new.jsp) via the First Name or Last Name.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Alkacon OpenCMS 10.5.4 and earlier is vulnerable to CSV injection via the First Name and Last Name fields in the New User module, enabling formula injection when exported CSV is opened.
Vulnerability
Overview
CVE-2019-11819 describes a CSV injection vulnerability in Alkacon OpenCMS versions 10.5.4 and earlier. The flaw resides in the New User module, specifically in the parameters for First Name and Last Name within the /opencms/system/workplace/admin/accounts/user_new.jsp page [3][4]. The application fails to sanitize user-supplied input before including it in exported CSV files, allowing an attacker to inject spreadsheet formulas.
Exploitation
Details
To exploit this vulnerability, an attacker must have access to create or modify user accounts (i.e., at minimum a user with privileges to add new users). By entering a payload such as =HYPERLINK("http://attacker-ip/path","IAmSafe") into the First Name or Last Name field, the malicious formula is stored. When an administrator or another user exports the user list using the Export User feature, the payload becomes embedded in the resulting CSV file [3][4]. The attack is triggered when the CSV file is opened in a spreadsheet application like Microsoft Excel or LibreOffice Calc, which interprets cells starting with = as formulas.
Impact
Successful exploitation can lead to several outcomes depending on the spreadsheet software and user behavior. Attackers may leverage known vulnerabilities in the spreadsheet engine (e.g., CVE-2014-3524) or rely on social engineering to bypass security warnings. Potential impacts include arbitrary code execution on the user's machine, exfiltration of data from the CSV file or other open spreadsheets, and further compromise of the user's system [4].
Mitigation
A fix for this issue is available in OpenCMS versions after 10.5.4. Users are advised to upgrade to the latest version. For those unable to upgrade, ensure that exported CSV files are opened only in a safe viewing mode or after sanitizing formula-related characters. The vulnerability has been publicly disclosed and a proof-of-concept exists, so patching is strongly recommended [2][3][4].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.opencms:opencms-coreMaven | < 11.0.0 | 11.0.0 |
Affected products
2- Alkacon/OpenCMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-q693-v7qf-p4xjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-11819ghsaADVISORY
- github.com/alkacon/opencms-core/issues/636ghsax_refsource_MISCWEB
- www.openwall.com/lists/oss-security/2019/05/05/2ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.