### [CVE-2024-56408](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56408) ![](https://img.shields.io/static/v1?label=Product&message=PhpSpreadsheet&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%201.29.7%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%202.0.0%2C%20%3C%202.1.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%202.2.0%2C%20%3C%202.3.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%203.0.0%2C%20%3C%203.7.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brightgreen) ### Description PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 have no sanitization in the `/vendor/phpoffice/phpspreadsheet/samples/Engineering/Convert-Online.php` file, which leads to the possibility of a cross-site scripting attack. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue. ### POC #### Reference - https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-x88g-h956-m5xg #### Github No PoCs found on GitHub currently.