VYPR
Critical severity9.8GHSA Advisory· Published May 5, 2026· Updated May 8, 2026

CVE-2026-34084

CVE-2026-34084

Description

PhpSpreadsheet is a library for reading and writing spreadsheet files. In versions 1.30.2 and earlier, 2.0.0 through 2.1.14, 2.2.0 through 2.4.3, 3.3.0 through 3.10.3, and 4.0.0 through 5.5.0, when the filename argument to IOFactory::load() is user-controlled, an attacker can supply a PHP stream wrapper path (such as phar://, ftp://, or ssh2.sftp://) that passes the is_file() check in File::assertFile(). The phar:// wrapper triggers deserialization of the PHAR metadata, which can lead to remote code execution if a suitable gadget chain is available in the application. The ftp:// and ssh2.sftp:// wrappers can be used for server-side request forgery. This issue has been fixed in versions 1.30.3, 2.1.15, 2.4.4, 3.10.4, and 5.6.0.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
phpoffice/phpspreadsheetPackagist
>= 4.0.0, < 5.6.05.6.0
phpoffice/phpspreadsheetPackagist
>= 3.3.0, < 3.10.43.10.4
phpoffice/phpspreadsheetPackagist
>= 2.2.0, < 2.4.42.4.4
phpoffice/phpspreadsheetPackagist
>= 2.0.0, < 2.1.152.1.15
phpoffice/phpspreadsheetPackagist
< 1.30.31.30.3

Affected products

2
  • <= 1.30.2+ 1 more
    • (no CPE)range: <= 1.30.2
    • cpe:2.3:a:phpoffice:phpspreadsheet:*:*:*:*:*:*:*:*range: <1.30.3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.