CVE-2026-40902: CWE-770: Allocation of Resources Without Limits or Throttling in PHPOffice PhpSpreadsheet
CVE-2026-40902 is a high-severity vulnerability in PHPOffice PhpSpreadsheet affecting multiple versions prior to 1. 30. 4, 2. 1. 16, 2. 4. 5, 3. 10. 5, and 5. 7.
AI Analysis
Technical Summary
The vulnerability in PhpSpreadsheet arises from the XLSX reader's ColumnAndRowAttributes::readRowAttributes() method failing to validate the 'r' attribute of <row> elements against the maximum spreadsheet row limit (1,048,576). An attacker can exploit this by crafting a minimal XLSX file containing a <row r="999999999"/> element, which inflates the cachedHighestRow variable to 999,999,999. Subsequent row iterations then attempt to loop nearly one billion times, causing excessive CPU consumption and potential denial of service. This issue affects multiple versions of PhpSpreadsheet before the fixed releases 1.30.4, 2.1.16, 2.4.5, 3.10.5, and 5.7.0. The CVSS v3.1 score is 7.5, indicating high severity, with network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability (denial of service).
Potential Impact
Successful exploitation results in denial of service due to CPU exhaustion when processing a malicious XLSX file with an inflated row number attribute. There is no impact on confidentiality or integrity. The vulnerability can be triggered remotely by an unauthenticated attacker supplying a crafted XLSX file to an application using the vulnerable PhpSpreadsheet versions.
Mitigation Recommendations
Fixed versions 1.30.4, 2.1.16, 2.4.5, 3.10.5, and 5.7.0 of PhpSpreadsheet address this vulnerability by properly validating row numbers against the maximum allowed limit. Users should upgrade to one of these versions or later. Patch status is not explicitly stated beyond these fixed versions; therefore, verify with the vendor advisory for the latest remediation guidance. No other mitigation or temporary fix is indicated in the provided data.
CVE-2026-40902: CWE-770: Allocation of Resources Without Limits or Throttling in PHPOffice PhpSpreadsheet
Description
CVE-2026-40902 is a high-severity vulnerability in PHPOffice PhpSpreadsheet affecting multiple versions prior to 1. 30. 4, 2. 1. 16, 2. 4. 5, 3. 10. 5, and 5. 7.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability in PhpSpreadsheet arises from the XLSX reader's ColumnAndRowAttributes::readRowAttributes() method failing to validate the 'r' attribute of <row> elements against the maximum spreadsheet row limit (1,048,576). An attacker can exploit this by crafting a minimal XLSX file containing a <row r="999999999"/> element, which inflates the cachedHighestRow variable to 999,999,999. Subsequent row iterations then attempt to loop nearly one billion times, causing excessive CPU consumption and potential denial of service. This issue affects multiple versions of PhpSpreadsheet before the fixed releases 1.30.4, 2.1.16, 2.4.5, 3.10.5, and 5.7.0. The CVSS v3.1 score is 7.5, indicating high severity, with network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to availability (denial of service).
Potential Impact
Successful exploitation results in denial of service due to CPU exhaustion when processing a malicious XLSX file with an inflated row number attribute. There is no impact on confidentiality or integrity. The vulnerability can be triggered remotely by an unauthenticated attacker supplying a crafted XLSX file to an application using the vulnerable PhpSpreadsheet versions.
Mitigation Recommendations
Fixed versions 1.30.4, 2.1.16, 2.4.5, 3.10.5, and 5.7.0 of PhpSpreadsheet address this vulnerability by properly validating row numbers against the maximum allowed limit. Users should upgrade to one of these versions or later. Patch status is not explicitly stated beyond these fixed versions; therefore, verify with the vendor advisory for the latest remediation guidance. No other mitigation or temporary fix is indicated in the provided data.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-04-15T16:37:22.767Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a03a7e4cbff5d86101ff96a
Added to database: 5/12/2026, 10:21:24 PM
Last enriched: 5/12/2026, 10:36:49 PM
Last updated: 5/12/2026, 11:39:41 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.