CVE-2025-55745
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-22

Last updated on: 2025-08-25

Assigner: GitHub, Inc.

Description
UnoPim is an open-source Product Information Management (PIM) system built on the Laravel framework. Versions 0.3.0 and prior are vulnerable to CSV injection, also known as formula injection, in the Quick Export feature. This vulnerability allows attackers to inject malicious content into exported CSV files. When the CSV file is opened in spreadsheet applications such as Microsoft Excel, the malicious input may be interpreted as a formula or command, potentially resulting in the execution of arbitrary code on the victim's device. Successful exploitation can lead to remote code execution, including the establishment of a reverse shell. Users are advised to upgrade to version 0.3.1 or later.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-22
Last Modified
2025-08-25
Generated
2026-05-07
AI Q&A
2025-08-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
webkul unopim to 0.3.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1236 The product saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by a spreadsheet product.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a CSV injection (also known as formula injection) in the Quick Export feature of UnoPim versions 0.3.0 and prior. It allows attackers to inject malicious content into exported CSV files. When these files are opened in spreadsheet applications like Microsoft Excel, the malicious content can be interpreted as a formula or command, potentially leading to the execution of arbitrary code on the victim's device, including remote code execution such as establishing a reverse shell.


How can this vulnerability impact me? :

If exploited, this vulnerability can lead to arbitrary code execution on your device when you open a maliciously crafted CSV file exported from UnoPim. This could result in unauthorized access, data compromise, or control over your system, including the possibility of a remote attacker establishing a reverse shell.


What immediate steps should I take to mitigate this vulnerability?

Users are advised to upgrade UnoPim to version 0.3.1 or later to mitigate the CSV injection vulnerability in the Quick Export feature.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart