Rukovoditel 3.3.1 contains a CSV injection vulnerability that allows authenticated users to inject malicious formulas into the firstname field. Attackers can craft payloads like =calc|a!z| to trigger code execution when an admin exports customer data as a CSV file.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/51490 | Exploit Third Party Advisory VDB Entry |
| https://www.rukovoditel.net/ | Product |
| https://www.vulncheck.com/advisories/rukovoditel-csv-injection-via-user-account-export | Third Party Advisory Exploit |
| https://www.exploit-db.com/exploits/51490 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-12-17 23:15
Updated : 2025-12-24 17:55
NVD link : CVE-2023-53913
Mitre link : CVE-2023-53913
CVE.ORG link : CVE-2023-53913
JSON object : View
Products Affected
rukovoditel
- rukovoditel
CWE
CWE-1236
Improper Neutralization of Formula Elements in a CSV File
