CVE-2026-40296 PUBLISHED

PhpSpreadsheet vulnerable to XSS in HTML writer via custom number format codes

Assigner: GitHub_M
Reserved: 10.04.2026 Published: 06.05.2026 Updated: 06.05.2026

PhpSpreadsheet is a pure PHP library for reading and writing spreadsheet files. The HTML writer skips htmlspecialchars escaping when a cell's formatted value differs from the original value. When a cell has a custom number format containing the text placeholder @ along with any additional literal characters (for example ". @", "@ ", or "x@"), the formatter replaces @ with the cell value and adds the extra characters, causing the formatted value to differ from the original and bypassing HTML escaping entirely. An attacker who can control the cell value and number format of an uploaded spreadsheet that is later converted to HTML and displayed to other users can achieve stored cross-site scripting. This issue is fixed in versions 5.7.0, 3.10.5, 2.4.5, 2.1.16, and 1.30.4.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CVSS Score: 5.4

Product Status

Vendor PHPOffice
Product PhpSpreadsheet
Versions
  • Version >= 4.0.0, <= 5.6.0 is affected
  • Version >= 3.3.0, <= 3.10.4 is affected
  • Version >= 2.2.0, <= 2.4.4 is affected
  • Version >= 2.0.0, <= 2.1.15 is affected
  • Version <= 1.30.3 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE