Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PhpSpreadsheet Library Vulnerability Enables Attackers to Feed Malicious HTML Input

Posted on August 29, 2025August 29, 2025 By CWS

A high-severity Server-Aspect Request Forgery (SSRF) vulnerability has been recognized within the broadly used PhpSpreadsheet library, probably permitting attackers to use inner community sources and compromise server safety. 

The vulnerability, tracked as CVE-2025-54370, impacts a number of variations of the phpoffice/phpspreadsheet bundle and carries a CVSS v4.0 rating of 8.7.

Key Takeaways1. SSRF in PhpSpreadsheet’s WorksheetDrawing::setPath through malicious HTML picture tags.2. Impacts 3. Replace instantly and validate inputs.

Excessive-Severity SSRF Vulnerability

The vulnerability resides within the setPath technique of the PhpOfficePhpSpreadsheetWorksheetDrawing class, the place malicious HTML enter can set off unauthorized server-side requests. 

Safety researcher Aleksey Solovev from Optimistic Applied sciences found this zero-day flaw whereas analyzing model 3.8.0 of the library.

The exploitation happens when attackers craft malicious HTML paperwork containing picture tags with src attributes pointing to inner community sources. 

When the PhpSpreadsheet HTML reader processes these paperwork, the library inadvertently makes requests to the desired URLs, probably exposing delicate inner providers.

Proof-of-concept code demonstrates the assault vector:

The malicious HTML file incorporates:

Danger FactorsDetailsAffected Merchandise– Variations ImpactHigh confidentiality influence through SSRFExploit PrerequisitesUntrusted HTML enter handed to the HTML readerCVSS 3.1 Score7.5 (Excessive)

Affected Variations and Safety Patches

The vulnerability impacts a number of model ranges throughout the PhpSpreadsheet ecosystem:

Legacy variations: All variations previous to 1.30.0

Model 2.x sequence: 2.0.0 by means of 2.1.11 and a couple of.2.0 by means of 2.3.x

Model 3.x sequence: 3.0.0 by means of 3.9.x

Model 4.x sequence: All 4.x variations prior to five.0.0

Patched variations embody 1.30.0, 2.1.12, 2.4.0, 3.10.0, and 5.0.0. Organizations utilizing affected variations ought to prioritize speedy updates to stop potential exploitation.

The vulnerability classification follows CWE-918: Server-Aspect Request Forgery, with assault vectors requiring no authentication or consumer interplay (AV:N/AC:L/PR:N/UI:N). 

This allows distant attackers to use the flaw by means of network-accessible functions processing user-supplied HTML content material.

Extra safety considerations embody potential phar deserialization assaults by means of the file_exists technique of the weak code, creating a number of assault surfaces inside the identical element. 

Organizations using PhpSpreadsheet for HTML doc processing ought to implement enter validation and community segmentation as further protecting measures whereas deploying the safety updates.

Discover this Story Fascinating! Comply with us on LinkedIn and X to Get Extra Immediate Updates.

Cyber Security News Tags:Attackers, Enables, Feed, HTML, Input, Library, Malicious, PhpSpreadsheet, Vulnerability

Post navigation

Previous Post: Silver Fox APT Hackers Leveraging Vulnerable Driver to Attack Windows 10 and 11 Systems by Evading EDR/AV
Next Post: Feds Seize $6.4M VerifTools Fake-ID Marketplace, but Operators Relaunch on New Domain

Related Posts

Guided Selling in 3D Product Configurators Cyber Security News
North Korean Kimsuky Hackers Data Breach Cyber Security News
New ‘Win-DoS’ Zero-Click Vulnerabilities Turns Windows Domain Controllers into DDOS Botnet Cyber Security News
Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results Cyber Security News
Securing Virtualized Environments – Hypervisor Security Best Practices Cyber Security News
Hackers Abuse Microsoft Teams to Gain Remote Access With PowerShell-based Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads
  • In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks
  • VerifTools Fake ID Operation Dismantled by Law Enforcement
  • Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems
  • Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads
  • In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks
  • VerifTools Fake ID Operation Dismantled by Law Enforcement
  • Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems
  • Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News