CVE-2026-35453 PUBLISHED

PhpSpreadsheet XSS via number format text substitution in HTML Writer

Assigner: GitHub_M
Reserved: 02.04.2026 Published: 05.05.2026 Updated: 05.05.2026

PhpSpreadsheet is a library for reading and writing spreadsheet files. In versions 1.30.3 and earlier, 2.0.0 through 2.1.15, 2.2.0 through 2.4.4, 3.3.0 through 3.10.4, and 4.0.0 through 5.6.0, the HTML Writer skips htmlspecialchars() output escaping when a cell uses a custom number format containing the @ text placeholder with additional literal text (e.g., @ "items"). The escaping is only applied when the formatted output strictly equals the original cell value. When the format code contains @ with quoted literal text, the formatter substitutes the raw cell value into the format string and returns early without invoking the escaping callback. An attacker who can control cell content in a spreadsheet processed by the HTML Writer can inject arbitrary HTML and JavaScript into the generated output. This issue has been fixed in versions 1.30.4, 2.1.16, 2.4.5, 3.10.5, and 5.7.0.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
CVSS Score: 4.8

Product Status

Vendor PHPOffice
Product PhpSpreadsheet
Versions
  • Version >= 4.0.0, <= 5.6.0 is affected
  • Version >= 3.3.0, <= 3.10.4 is affected
  • Version >= 2.2.0, <= 2.4.4 is affected
  • Version >= 2.0.0, <= 2.1.15 is affected
  • Version <= 1.30.3 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE