๐Ÿ” CVE Alert

CVE-2026-35453

UNKNOWN 0.0

PhpSpreadsheet XSS via number format text substitution in HTML Writer

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

PhpSpreadsheet is a library for reading and writing spreadsheet files. In versions 1.30.3 and earlier, 2.0.0 through 2.1.15, 2.2.0 through 2.4.4, 3.3.0 through 3.10.4, and 4.0.0 through 5.6.0, the HTML Writer skips htmlspecialchars() output escaping when a cell uses a custom number format containing the @ text placeholder with additional literal text (e.g., @ "items"). The escaping is only applied when the formatted output strictly equals the original cell value. When the format code contains @ with quoted literal text, the formatter substitutes the raw cell value into the format string and returns early without invoking the escaping callback. An attacker who can control cell content in a spreadsheet processed by the HTML Writer can inject arbitrary HTML and JavaScript into the generated output. This issue has been fixed in versions 1.30.4, 2.1.16, 2.4.5, 3.10.5, and 5.7.0.

CWE CWE-79
Vendor phpoffice
Product phpspreadsheet
Published May 5, 2026
Stay Ahead of the Next One

Get instant alerts for phpoffice phpspreadsheet

Be the first to know when new unknown vulnerabilities affecting phpoffice phpspreadsheet are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

PHPOffice / PhpSpreadsheet
>= 4.0.0, <= 5.6.0 >= 3.3.0, <= 3.10.4 >= 2.2.0, <= 2.4.4 >= 2.0.0, <= 2.1.15 <= 1.30.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-6wpp-88cp-7q68