Home

Description

PhpSpreadsheet is a library for reading and writing spreadsheet files. In versions 1.30.2 and earlier, 2.0.0 through 2.1.14, 2.2.0 through 2.4.3, 3.3.0 through 3.10.3, and 4.0.0 through 5.5.0, when the filename argument to IOFactory::load() is user-controlled, an attacker can supply a PHP stream wrapper path (such as phar://, ftp://, or ssh2.sftp://) that passes the is_file() check in File::assertFile(). The phar:// wrapper triggers deserialization of the PHAR metadata, which can lead to remote code execution if a suitable gadget chain is available in the application. The ftp:// and ssh2.sftp:// wrappers can be used for server-side request forgery. This issue has been fixed in versions 1.30.3, 2.1.15, 2.4.4, 3.10.4, and 5.6.0.

PUBLISHED Reserved 2026-03-25 | Published 2026-05-05 | Updated 2026-05-05 | Assigner GitHub_M




CRITICAL: 9.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-502: Deserialization of Untrusted Data

CWE-918: Server-Side Request Forgery (SSRF)

Product status

>= 4.0.0, <= 5.5.0
affected

>= 3.3.0, <= 3.10.3
affected

>= 2.2.0, <= 2.4.3
affected

>= 2.0.0, <= 2.1.14
affected

<= 1.30.2
affected

References

github.com/...dsheet/security/advisories/GHSA-q4q6-r8wh-5cgh exploit

github.com/...dsheet/security/advisories/GHSA-q4q6-r8wh-5cgh

cve.org (CVE-2026-34084)

nvd.nist.gov (CVE-2026-34084)

Download JSON