### [CVE-2024-56366](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56366) ![](https://img.shields.io/static/v1?label=Product&message=PhpSpreadsheet&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%201.29.7%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%202.0.0%2C%20%3C%202.1.6%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%202.2.0%2C%20%3C%202.3.5%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%203.0.0%2C%20%3C%203.7.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brightgreen) ### Description PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 are vulnerable to unauthorized reflected cross-site scripting in the `Accounting.php` file. Using the `/vendor/phpoffice/phpspreadsheet/samples/Wizards/NumberFormat/Accounting.php` script, an attacker can perform a cross-site scripting attack. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue. ### POC #### Reference - https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-c6fv-7vh8-2rhr #### Github No PoCs found on GitHub currently.