CVE-2026-34084 PUBLISHED

PhpSpreadsheet SSRF and RCE via PHP stream wrappers in IOFactory::load

Assigner: GitHub_M
Reserved: 25.03.2026 Published: 05.05.2026 Updated: 05.05.2026

PhpSpreadsheet is a library for reading and writing spreadsheet files. In versions 1.30.2 and earlier, 2.0.0 through 2.1.14, 2.2.0 through 2.4.3, 3.3.0 through 3.10.3, and 4.0.0 through 5.5.0, when the filename argument to IOFactory::load() is user-controlled, an attacker can supply a PHP stream wrapper path (such as phar://, ftp://, or ssh2.sftp://) that passes the is_file() check in File::assertFile(). The phar:// wrapper triggers deserialization of the PHAR metadata, which can lead to remote code execution if a suitable gadget chain is available in the application. The ftp:// and ssh2.sftp:// wrappers can be used for server-side request forgery. This issue has been fixed in versions 1.30.3, 2.1.15, 2.4.4, 3.10.4, and 5.6.0.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.2

Product Status

Vendor PHPOffice
Product PhpSpreadsheet
Versions
  • Version >= 4.0.0, <= 5.5.0 is affected
  • Version >= 3.3.0, <= 3.10.3 is affected
  • Version >= 2.2.0, <= 2.4.3 is affected
  • Version >= 2.0.0, <= 2.1.14 is affected
  • Version <= 1.30.2 is affected

References

Problem Types

  • CWE-502: Deserialization of Untrusted Data CWE
  • CWE-918: Server-Side Request Forgery (SSRF) CWE