Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42901: n/a

0
Medium
VulnerabilityCVE-2024-42901cvecve-2024-42901
Published: Tue Sep 03 2024 (09/03/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A CSV injection vulnerability in Lime Survey v6.5.12 allows attackers to execute arbitrary code via uploading a crafted CSV file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:19:33 UTC

Technical Analysis

CVE-2024-42901 is a CSV injection vulnerability identified in Lime Survey version 6.5.12. The vulnerability arises from the improper sanitization of CSV files uploaded to the Lime Survey platform, allowing an attacker to embed malicious formulas or code within the CSV content. When such a crafted CSV file is opened in spreadsheet applications like Microsoft Excel or LibreOffice Calc, the embedded code can execute arbitrary commands, potentially compromising the confidentiality and integrity of the system or data. The attack vector requires an attacker to have high privileges (authenticated user with upload rights) and necessitates user interaction to open the malicious CSV file, which limits the ease of exploitation. The vulnerability is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation), indicating that the root cause is insufficient input validation and output encoding. The CVSS v3.1 score of 4.8 reflects a medium severity level, with network attack vector, low attack complexity, but requiring privileges and user interaction. No patches or official fixes have been released as of the publication date, and no known exploits are reported in the wild. This vulnerability poses a risk primarily to organizations using Lime Survey for data collection and analysis, especially those that allow users to upload or export CSV files without proper sanitization. Attackers could leverage this to execute code on client machines opening the CSV, potentially leading to data theft or further compromise.

Potential Impact

The impact of CVE-2024-42901 is primarily on the confidentiality and integrity of data handled by Lime Survey users. Successful exploitation could allow attackers to execute arbitrary code on client machines when malicious CSV files are opened, potentially leading to data leakage, credential theft, or further malware deployment. Since the attack requires authenticated access and user interaction, the threat is somewhat limited to insider threats or compromised accounts. However, organizations relying on Lime Survey for sensitive data collection, such as academic institutions, market research firms, and government agencies, could face significant risks if attackers exploit this vulnerability. The lack of availability impact means systems remain operational, but the trustworthiness of exported data and user environments is compromised. The absence of known exploits in the wild reduces immediate risk, but the medium severity score indicates that timely mitigation is necessary to prevent future exploitation.

Mitigation Recommendations

To mitigate CVE-2024-42901, organizations should implement several specific measures beyond generic advice: 1) Immediately restrict CSV upload permissions to only trusted and necessary users to reduce the attack surface. 2) Implement server-side sanitization of CSV content to neutralize any embedded formulas or scripts before storing or exporting files. This can include escaping characters like '=', '+', '-', and '@' at the start of CSV cells. 3) Educate users about the risks of opening CSV files from untrusted sources and encourage opening such files in safe environments or with protections like Excel's 'Protected View'. 4) Monitor Lime Survey logs for unusual upload activity or attempts to upload suspicious CSV files. 5) If possible, disable CSV export functionality temporarily until a patch is available. 6) Follow Lime Survey vendor communications closely for patches or updates addressing this vulnerability and apply them promptly. 7) Consider deploying endpoint protection solutions that can detect and block malicious macro or formula execution in spreadsheet applications. These targeted steps will help reduce the risk of exploitation while maintaining operational continuity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cd0b7ef31ef0b569465

Added to database: 2/25/2026, 9:42:40 PM

Last enriched: 2/28/2026, 6:19:33 AM

Last updated: 4/12/2026, 6:12:16 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses