Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3665: NULL Pointer Dereference in xlnt-community xlnt

0
Medium
VulnerabilityCVE-2026-3665cvecve-2026-3665
Published: Sat Mar 07 2026 (03/07/2026, 15:32:08 UTC)
Source: CVE Database V5
Vendor/Project: xlnt-community
Product: xlnt

Description

A vulnerability was identified in xlnt-community xlnt up to 1.6.1. The affected element is the function xlnt::detail::xlsx_consumer::read_office_document of the file source/detail/serialization/xlsx_consumer.cpp of the component XLSX File Parser. The manipulation leads to null pointer dereference. The attack must be carried out locally. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 03/07/2026, 16:01:07 UTC

Technical Analysis

CVE-2026-3665 is a vulnerability identified in the xlnt-community xlnt library, specifically affecting versions 1.6.0 and 1.6.1. The flaw exists in the XLSX file parser component, within the function xlnt::detail::xlsx_consumer::read_office_document, located in the source/detail/serialization/xlsx_consumer.cpp file. The vulnerability manifests as a null pointer dereference, which occurs when the function attempts to access or manipulate memory through a pointer that has not been properly initialized or has been set to null. This leads to an application crash or denial of service when processing specially crafted XLSX files. The attack vector is local, requiring the attacker to have low-level privileges on the target system, and no user interaction is necessary to trigger the vulnerability. The CVSS 4.8 score reflects medium severity, considering the limited attack surface and impact scope. Although an exploit is publicly available, there are no reports of active exploitation in the wild. The vulnerability does not allow privilege escalation, remote code execution, or data confidentiality breaches but can disrupt services relying on the xlnt library for XLSX file handling. The root cause is improper input validation or error handling in the XLSX parsing logic, which should be addressed by the vendor in future patches.

Potential Impact

The primary impact of CVE-2026-3665 is denial of service due to application crashes when processing malicious XLSX files. Organizations that use the xlnt library for XLSX file parsing in local applications or services may experience instability or downtime if exposed to crafted files. This can disrupt workflows, especially in environments where automated XLSX processing is critical. Since exploitation requires local access and low privileges, the risk is somewhat contained within internal threat actors or compromised users. There is no direct risk of data exfiltration or remote code execution, limiting the severity to availability concerns. However, in high-availability or critical systems relying on xlnt, repeated crashes could lead to operational disruptions. The lack of known exploits in the wild reduces immediate threat but does not eliminate future risk. Overall, the impact is moderate but should not be ignored in sensitive or production environments.

Mitigation Recommendations

To mitigate CVE-2026-3665, organizations should first verify if they are using xlnt versions 1.6.0 or 1.6.1 and plan to upgrade to a patched version once available. In the absence of an official patch, consider applying source code fixes that add null pointer checks and improve error handling in the xlsx_consumer.cpp file, particularly in the read_office_document function. Restrict local access to systems running applications that utilize xlnt to trusted users only, minimizing the risk of local exploitation. Implement application-level sandboxing or process isolation to contain potential crashes and prevent cascading failures. Monitor logs for abnormal application terminations related to XLSX file processing. Additionally, validate and sanitize XLSX files before processing, using alternative libraries or tools if necessary. Engage with the xlnt-community for updates and security advisories. Finally, incorporate this vulnerability into vulnerability management and incident response plans to ensure timely detection and remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-06T20:34:47.839Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ac4840c48b3f10ffa9dde2

Added to database: 3/7/2026, 3:46:08 PM

Last enriched: 3/7/2026, 4:01:07 PM

Last updated: 3/8/2026, 2:05:21 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses