Low severity3.3NVD Advisory· Published Mar 7, 2026· Updated Apr 29, 2026
CVE-2026-3663
CVE-2026-3663
Description
A vulnerability was found in xlnt-community xlnt up to 1.6.1. This issue affects the function xlnt::detail::compound_document_istreambuf::xsgetn of the file source/detail/cryptography/compound_document.cpp of the component XLSX File Parser. Performing a manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit has been made public and could be used. The patch is named 147. It is recommended to apply a patch to fix this issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/oneafter/0128/blob/main/xl3/repronvdExploit
- github.com/xlnt-community/xlnt/issues/139nvdExploitIssue TrackingVendor Advisory
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- github.com/xlnt-community/xlnt/pull/147nvdIssue Tracking
- vuldb.comnvdPermissions RequiredVDB Entry
News mentions
0No linked articles in our index yet.