Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-45084

Summary
Assigner-ibm
Assigner Org ID-9a959283-ebb5-44b6-b705-dcc2bbced522
Published At-19 Feb, 2025 | 15:24
Updated At-29 Sep, 2025 | 17:55
Rejected At-
Credits

IBM Cognos Controller CSV injection

IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 could allow an authenticated attacker to conduct formula injection. An attacker could execute arbitrary commands on the system, caused by improper validation of file contents.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:ibm
Assigner Org ID:9a959283-ebb5-44b6-b705-dcc2bbced522
Published At:19 Feb, 2025 | 15:24
Updated At:29 Sep, 2025 | 17:55
Rejected At:
▼CVE Numbering Authority (CNA)
IBM Cognos Controller CSV injection

IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 could allow an authenticated attacker to conduct formula injection. An attacker could execute arbitrary commands on the system, caused by improper validation of file contents.

Affected Products
Vendor
IBM CorporationIBM
Product
Cognos Controller
CPEs
  • cpe:2.3:a:ibm:cognos_controller:11.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:ibm:cognos_controller:11.0.1:fix_pack_3:*:*:*:*:*:*
Default Status
unaffected
Versions
Affected
  • From 11.0.0 through 11.0.1 (semver)
    • -> affectedfromFP3
Vendor
IBM CorporationIBM
Product
Controller
Default Status
unaffected
Versions
Affected
  • 11.1.0
Problem Types
TypeCWE IDDescription
CWECWE-1236CWE-1236 Improper Neutralization of Formula Elements in a CSV File
Type: CWE
CWE ID: CWE-1236
Description: CWE-1236 Improper Neutralization of Formula Elements in a CSV File
Metrics
VersionBase scoreBase severityVector
3.18.0HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.ibm.com/support/pages/node/7183597
vendor-advisory
patch
Hyperlink: https://www.ibm.com/support/pages/node/7183597
Resource:
vendor-advisory
patch
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@us.ibm.com
Published At:19 Feb, 2025 | 16:15
Updated At:29 Sep, 2025 | 18:15

IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 could allow an authenticated attacker to conduct formula injection. An attacker could execute arbitrary commands on the system, caused by improper validation of file contents.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.0HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CPE Matches

IBM Corporation
ibm
>>cognos_controller>>Versions from 11.0.0(inclusive) to 11.0.1.4(exclusive)
cpe:2.3:a:ibm:cognos_controller:*:*:*:*:*:*:*:*
IBM Corporation
ibm
>>controller>>11.1.0
cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>windows>>-
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-1236Primarypsirt@us.ibm.com
CWE ID: CWE-1236
Type: Primary
Source: psirt@us.ibm.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.ibm.com/support/pages/node/7183597psirt@us.ibm.com
Vendor Advisory
Hyperlink: https://www.ibm.com/support/pages/node/7183597
Source: psirt@us.ibm.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

115Records found

CVE-2023-3493
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.7||HIGH
EPSS-0.12% / 29.87%
||
7 Day CHG~0.00%
Published-30 Jun, 2023 | 21:14
Updated-04 Nov, 2024 | 20:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Neutralization of Formula Elements in a CSV File in fossbilling/fossbilling

Improper Neutralization of Formula Elements in a CSV File in GitHub repository fossbilling/fossbilling prior to 0.5.3.

Action-Not Available
Vendor-fossbillingfossbillingfossbilling
Product-fossbillingfossbilling/fossbillingfossbilling
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2024-51094
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8||HIGH
EPSS-0.37% / 58.97%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 00:00
Updated-22 May, 2025 | 17:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Snipe-IT v.7.0.13 build 15514 allows a low-privileged attacker to modify their profile name and inject a malicious payload into the "Name" field. When an administrator later accesses the People Management page, exports the data as a CSV file, and opens it, the injected payload will be executed, allowing the attacker to exfiltrate internal system data from the CSV file to a remote server.

Action-Not Available
Vendor-snipeitappn/asnipeitapp
Product-snipe-itn/asnipe-it
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2024-47572
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-8.3||HIGH
EPSS-0.74% / 73.01%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 14:09
Updated-16 Jul, 2025 | 13:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper neutralization of formula elements in a csv file in Fortinet FortiSOAR 7.2.1 through 7.4.1 allows attacker to execute unauthorized code or commands via manipulating csv file

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortisoarFortiSOAR
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2021-37702
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8||HIGH
EPSS-0.04% / 10.78%
||
7 Day CHG~0.00%
Published-18 Aug, 2021 | 14:45
Updated-04 Aug, 2024 | 01:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Neutralization of Formula Elements in a CSV File in pimcore/pimcore

Pimcore is an open source data & experience management platform. Prior to version 10.1.1, Data Object CSV import allows formular injection. The problem is patched in 10.1.1. Aside from upgrading, one may apply the patch manually as a workaround.

Action-Not Available
Vendor-Pimcore
Product-pimcorepimcore
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2022-2429
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-6.5||MEDIUM
EPSS-0.82% / 74.57%
||
7 Day CHG~0.00%
Published-06 Sep, 2022 | 17:18
Updated-31 Jan, 2025 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ultimate SMS Notifications for WooCommerce <= 1.4.1 - CSV Injection

The Ultimate SMS Notifications for WooCommerce plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.4.1 via the 'Export Utility' functionality. This makes it possible for authenticated attackers, such as a subscriber, to add untrusted input into billing information like their First Name that will embed into the exported CSV file triggered by an administrator and can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.

Action-Not Available
Vendor-ultimatesmsnotificationshomescript
Product-ultimate_sms_notifications_for_woocommerceUltimate SMS Notifications for WooCommerce
CWE ID-CWE-138
Improper Neutralization of Special Elements
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2022-41675
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-8||HIGH
EPSS-1.15% / 78.67%
||
7 Day CHG~0.00%
Published-29 Nov, 2022 | 03:30
Updated-25 Apr, 2025 | 14:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TEAM JOHNLONG SOFTWARE CO., LTD. MAILD Mail Server - Formula Injection

A remote attacker with general user privilege can inject malicious code in the form content of Raiden MAILD Mail Server website. Other users export form content as CSV file can trigger arbitrary code execution and allow the attacker to perform arbitrary system operation or disrupt service on the user side.

Action-Not Available
Vendor-raidenmaildTEAM JOHNLONG SOFTWARE CO., LTD.
Product-raidenmaildMAILD Mail Server
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2020-36503
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-8||HIGH
EPSS-1.27% / 79.74%
||
7 Day CHG~0.00%
Published-01 Nov, 2021 | 08:45
Updated-04 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Connections Business Directory < 9.7 - Admin+ CSV Injection

The Connections Business Directory WordPress plugin before 9.7 does not validate or sanitise some connections' fields, which could lead to a CSV injection issue

Action-Not Available
Vendor-connections-proUnknown
Product-connections_business_directoryConnections Business Directory
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2021-25960
Matching Score-4
Assigner-Mend
ShareView Details
Matching Score-4
Assigner-Mend
CVSS Score-8||HIGH
EPSS-0.53% / 67.34%
||
7 Day CHG~0.00%
Published-29 Sep, 2021 | 13:55
Updated-16 Sep, 2024 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SuiteCRM - CSV Injection in Accounts Module

In “SuiteCRM” application, v7.11.18 through v7.11.19 and v7.10.29 through v7.10.31 are affected by “CSV Injection” vulnerability (Formula Injection). A low privileged attacker can use accounts module to inject payloads in the input fields. When an administrator access accounts module to export the data as a CSV file and opens it, the payload gets executed. This was not fixed properly as part of CVE-2020-15301, allowing the attacker to bypass the security measure.

Action-Not Available
Vendor-SalesAgility Ltd.
Product-suitecrmSuiteCRM
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2021-25962
Matching Score-4
Assigner-Mend
ShareView Details
Matching Score-4
Assigner-Mend
CVSS Score-8||HIGH
EPSS-0.43% / 62.83%
||
7 Day CHG~0.00%
Published-29 Sep, 2021 | 13:55
Updated-17 Sep, 2024 | 02:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Shuup - Formula Injection in Checkout Addresses

“Shuup” application in versions 0.4.2 to 2.10.8 is affected by the “Formula Injection” vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed.

Action-Not Available
Vendor-shuupshuup
Product-shuupshuup
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2021-24441
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-8||HIGH
EPSS-0.84% / 74.91%
||
7 Day CHG~0.00%
Published-12 Jul, 2021 | 19:21
Updated-03 Aug, 2024 | 19:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sign-up Sheets < 1.0.14 - Authenticated CSV Injection

The Sign-up Sheets WordPress plugin before 1.0.14 does not not sanitise or validate the Sheet title when generating the CSV to export, which could lead to a CSV injection issue

Action-Not Available
Vendor-fetchdesignsUnknown
Product-sign-up_sheetsSign-up Sheets
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2020-9017
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8||HIGH
EPSS-0.41% / 61.35%
||
7 Day CHG~0.00%
Published-25 Feb, 2020 | 16:58
Updated-04 Aug, 2024 | 10:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LiteCart through 2.2.1 allows CSV injection via a customer's profile.

Action-Not Available
Vendor-litecartn/a
Product-litecartn/a
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2024-24337
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-2.97% / 86.64%
||
7 Day CHG~0.00%
Published-12 Feb, 2024 | 00:00
Updated-29 Sep, 2025 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CSV Injection vulnerability in '/members/moremember.pl' and '/admin/aqbudgets.pl' endpoints in Koha Library Management System version 23.05.05 and earlier allows attackers to to inject DDE commands into csv exports via the 'Budget' and 'Patrons Member' components.

Action-Not Available
Vendor-kohan/akoha-community
Product-kohan/akoha_library_software
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2022-3558
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-8||HIGH
EPSS-0.84% / 74.87%
||
7 Day CHG~0.00%
Published-07 Nov, 2022 | 00:00
Updated-01 May, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Import and export users and customers < 1.20.5 - Subscriber+ CSV Injection

The Import and export users and customers WordPress plugin before 1.20.5 does not properly escape data when exporting it via CSV files.

Action-Not Available
Vendor-codectionUnknown
Product-import_and_export_users_and_customersImport and export users and customers
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2020-22277
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8||HIGH
EPSS-1.10% / 78.21%
||
7 Day CHG~0.00%
Published-04 Nov, 2020 | 16:57
Updated-04 Aug, 2024 | 14:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Import and export users and customers WordPress Plugin through 1.15.5.11 allows CSV injection via a customer's profile.

Action-Not Available
Vendor-codectionn/a
Product-import_and_export_users_and_customersn/a
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2022-38844
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8||HIGH
EPSS-0.68% / 71.83%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 13:25
Updated-03 Aug, 2024 | 11:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CSV Injection in Create Contacts in EspoCRM 7.1.8 allows remote authenticated users to run system commands via creating contacts with payloads capable of executing system commands. Admin user exporting contacts in CSV file may end up executing the malicious system commands on his system.

Action-Not Available
Vendor-espocrmn/a
Product-espocrmn/a
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found