CVE-2025-60852
BaseFortify
Publication date: 2025-10-23
Last updated on: 2025-10-27
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| instant_developer | foundation | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1236 | The product saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by a spreadsheet product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a CSV Injection (also known as Formula Injection) in Instant Developer Foundation versions prior to 25.0.9600. It occurs because the framework does not properly sanitize user-controlled input before including it in CSV exports. Specifically, input values starting with '+' or '-' are directly included in the CSV file without sanitization, causing spreadsheet software like Microsoft Excel or LibreOffice Calc to interpret them as formulas. This can lead to malicious code execution when the CSV file is opened. [1]
How can this vulnerability impact me? :
The vulnerability can lead to local code execution on the system where the exported CSV file is opened. For example, an attacker can craft input that triggers execution of commands via Excel's Dynamic Data Exchange (DDE) feature, such as launching applications like the Windows calculator. It can also enable data exfiltration through spreadsheet functions like HYPERLINK and unauthorized manipulation of spreadsheet data. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking exported CSV files from applications built with Instant Developer Foundation versions prior to 25.0.9600 for unsanitized user input starting with '+' or '-' characters that may be interpreted as formulas by spreadsheet software. A practical detection method is to export CSV files from the application and inspect them for such payloads. For example, you can use command-line tools like 'grep' to search for lines starting with '+' or '-' in CSV files: grep -E '^[+-]' exported_file.csv. Additionally, testing with the known payload '+CMD|' /C calc'!A0' in user input fields and then exporting and opening the CSV file in Excel (with DDE enabled) can confirm the vulnerability. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading the Instant Developer Foundation framework to version 25.0.9600 or later, where the vulnerability is fixed. Until the upgrade is possible, avoid opening CSV files exported from affected applications in spreadsheet software with DDE enabled, or disable DDE launch in Excel to prevent automatic execution of formulas. Additionally, sanitize or validate user input to ensure that values starting with '+' or '-' are properly escaped or quoted before inclusion in CSV exports. [1]