Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3463: Heap-based Buffer Overflow in xlnt-community xlnt

0
Medium
VulnerabilityCVE-2026-3463cvecve-2026-3463
Published: Tue Mar 03 2026 (03/03/2026, 12:02:10 UTC)
Source: CVE Database V5
Vendor/Project: xlnt-community
Product: xlnt

Description

A weakness has been identified in xlnt-community xlnt up to 1.6.1. Impacted is the function xlnt::detail::binary_writer::append of the file source/detail/binary.hpp of the component Compound Document Parser. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been made available to the public and could be used for attacks. Patch name: 147. It is suggested to install a patch to address this issue.

AI-Powered Analysis

AILast updated: 03/03/2026, 12:32:38 UTC

Technical Analysis

CVE-2026-3463 identifies a heap-based buffer overflow vulnerability in the xlnt-community xlnt library, a C++ library used for reading, writing, and modifying Excel spreadsheet files. The vulnerability resides in the append function of the binary_writer class within the Compound Document Parser component (source/detail/binary.hpp). Specifically, improper handling of data during the append operation leads to a heap overflow condition, which can corrupt memory and potentially allow an attacker to execute arbitrary code or cause denial of service by crashing the application. The flaw affects versions 1.6.0 and 1.6.1 of xlnt. Exploitation requires local access with limited privileges (PR:L) but does not require user interaction or elevated privileges. The vulnerability has been publicly disclosed with an available proof-of-concept exploit, increasing the risk of exploitation. The CVSS v4.0 base score is 4.8, reflecting medium severity due to local attack vector and limited impact scope. The vendor has released a patch (Patch 147) to address this issue, and upgrading to a patched version is advised. This vulnerability primarily impacts applications and systems that embed or utilize xlnt for Excel file processing, which may include desktop applications, automated data processing tools, and software development projects that handle spreadsheet files.

Potential Impact

The primary impact of CVE-2026-3463 is the potential for local attackers to cause memory corruption through a heap-based buffer overflow, which can lead to application crashes (denial of service) or potentially arbitrary code execution if exploited successfully. While the attack requires local access and limited privileges, the availability of a public exploit increases the likelihood of exploitation in environments where multiple users share access or where local user accounts are less restricted. Organizations using xlnt in desktop applications, automated workflows, or development environments may face risks of service disruption or compromise of the affected application. However, the vulnerability does not allow remote exploitation, limiting its impact to local threat scenarios. The confidentiality, integrity, and availability of systems using xlnt could be affected if attackers leverage this flaw to escalate privileges or execute malicious code within the local context. Overall, the impact is medium but could be significant in multi-user or shared environments where local access is easier to obtain.

Mitigation Recommendations

To mitigate CVE-2026-3463, organizations should immediately apply the vendor-provided patch (Patch 147) that addresses the heap-based buffer overflow in xlnt versions 1.6.0 and 1.6.1. If patching is not immediately possible, restrict local access to systems running applications that use xlnt to trusted users only. Implement strict user account controls and limit the ability of local users to execute or influence xlnt-based processes. Conduct code reviews and testing for any custom software that embeds xlnt to ensure it does not expose the vulnerable functionality to untrusted inputs. Employ runtime protections such as heap memory protection mechanisms (e.g., ASLR, DEP) to reduce exploitation success. Monitor local system logs for unusual crashes or behavior related to xlnt processes. Finally, maintain an inventory of software components to identify all instances of xlnt usage and prioritize patching accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-03T06:03:44.804Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a6d18cd1a09e29cb1024e1

Added to database: 3/3/2026, 12:18:20 PM

Last enriched: 3/3/2026, 12:32:38 PM

Last updated: 3/4/2026, 6:05:00 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses