CVE-2026-3665

A vulnerability was identified in xlnt-community xlnt up to 1.6.1. The affected element is the function xlnt::detail::xlsx_consumer::read_office_document of the file source/detail/serialization/xlsx_consumer.cpp of the component XLSX File Parser. The manipulation leads to null pointer dereference. The attack must be carried out locally. The exploit is publicly available and might be used.
References
Link Resource
https://github.com/oneafter/0128/blob/main/xl4/repro Exploit
https://github.com/xlnt-community/xlnt/ Product
https://github.com/xlnt-community/xlnt/issues/140 Exploit Issue Tracking Vendor Advisory
https://vuldb.com/?ctiid.349554 Permissions Required VDB Entry
https://vuldb.com/?id.349554 Third Party Advisory VDB Entry
https://vuldb.com/?submit.764647 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:xlnt-community:xlnt:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-07 16:15

Updated : 2026-03-10 20:37


NVD link : CVE-2026-3665

Mitre link : CVE-2026-3665

CVE.ORG link : CVE-2026-3665


JSON object : View

Products Affected

xlnt-community

  • xlnt
CWE
CWE-404

Improper Resource Shutdown or Release

CWE-476

NULL Pointer Dereference