| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q4q6-r8wh-5cgh | PhpSpreadsheet has SSRF/RCE in IOFactory::load when $filename is user controlled |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 05 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phpoffice
Phpoffice phpspreadsheet |
|
| Vendors & Products |
Phpoffice
Phpoffice phpspreadsheet |
Tue, 05 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PhpSpreadsheet is a library for reading and writing spreadsheet files. In versions 1.30.2 and earlier, 2.0.0 through 2.1.14, 2.2.0 through 2.4.3, 3.3.0 through 3.10.3, and 4.0.0 through 5.5.0, when the filename argument to IOFactory::load() is user-controlled, an attacker can supply a PHP stream wrapper path (such as phar://, ftp://, or ssh2.sftp://) that passes the is_file() check in File::assertFile(). The phar:// wrapper triggers deserialization of the PHAR metadata, which can lead to remote code execution if a suitable gadget chain is available in the application. The ftp:// and ssh2.sftp:// wrappers can be used for server-side request forgery. This issue has been fixed in versions 1.30.3, 2.1.15, 2.4.4, 3.10.4, and 5.6.0. | |
| Title | PhpSpreadsheet SSRF and RCE via PHP stream wrappers in IOFactory::load | |
| Weaknesses | CWE-502 CWE-918 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-05T19:32:59.799Z
Reserved: 2026-03-25T16:21:40.869Z
Link: CVE-2026-34084
Updated: 2026-05-05T19:32:47.363Z
Status : Received
Published: 2026-05-05T20:16:37.007
Modified: 2026-05-05T20:16:37.007
Link: CVE-2026-34084
No data.
OpenCVE Enrichment
Updated: 2026-05-05T21:30:05Z
Github GHSA